Virus

Android Virus Served up by User MYOURNET

As you're reading this, the threat is essentially over, that is, supposing you didn't download the apps in question before Google shut this whole situation down. As this sort of thing requires action first, details second, we'll begin by saying that all of the apps that were serving Malware were hosted by user MYOURNET and should now be taken down from the Android Marketplace. The full list of these apps can be found below.

Lookout Mobile Security Analyzes that Super Evil Geinimi Trojan

Oh that crappy ol' Geinimi Trojan making its way around the Android world has been analyzed those superheroes of mobile security: Lookout (or lookout, with the lower-case L if you please.) Making a big bad name for themselves since their inception, this is definitely a power-play on the part of those that plant the nice green leaf at the upper-left of your Android screen. They've taken the time to take apart the trojan for your pleasure and so that you might be smart when it comes to avoiding or, god forbid, dealing with it.

Geinimi Android trojan piggybacks 3rd-party apps & sends personal info to hackers

A new Android trojan has been discovered, Geinimi, capable of stripping information from a user's device and sending that to a third-party, or even allowing the handset's functionality to be remotely controlled. According to Lookout, the Geinimi malware is installed as a side-effect of compromised third-party applications; these have been found in Chinese app stores. Installed, the trojan sends the phone's location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI) to remote servers. Titles in the Android Market are clean, however, so only those users who side-load apps onto their smartphones should be at risk. Still, it's a good idea to check the security permissions on each app rather than blindly stab at the OK button, since these compromised Geinimi titles ask for far more access to your phone than a regular app might.

Another SMS Sending Trojan Released onto Android Devices

The latest SMS Trojan, Trojan-SMS-AndroidOS-FakePlayer-B, is now being distributed via Russian-language sites that are offering up video clips. Although it has not yet been spotted on any other sites, it could make it’s way to english based and other sites in the near future. When you visit this site on another mobile platform you receive the desired clip, however, if you are running the Android OS the trojan will download itself (with your unaware consent). This particular method of delivery implies that the people who are running and hosting these sites are in on the scam and it’s not accidental.
1 2