{"id":947,"date":"2010-12-31T19:42:27","date_gmt":"2010-12-31T13:42:27","guid":{"rendered":"http:\/\/techsatwork.com\/blog\/?p=947"},"modified":"2016-01-07T11:31:07","modified_gmt":"2016-01-07T05:31:07","slug":"when-geinimi-meets-android","status":"publish","type":"post","link":"https:\/\/techsatwork.com\/?p=947","title":{"rendered":"Geinimi meets Android !"},"content":{"rendered":"<p>Geinimi, a sophisticated new Android Trojan has emerged from China. \u00c2\u00a0This Trojan once installed \u00c2\u00a0compromises significant amount of \u00c2\u00a0data on a Android phone and sends it to remote servers.<br \/>\n<a rel=\"attachment wp-att-948\" href=\"https:\/\/techsatwork.com\/blog\/?attachment_id=948\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-948\" title=\"images\" src=\"https:\/\/techsatwork.com\/blog\/wp-content\/uploads\/2010\/12\/images.jpeg\" alt=\"\" width=\"200\" height=\"150\" \/><\/a>Geinimi as been one of the most advanced \u00c2\u00a0Android malware in the wild and it has botnet-like capabilities. \u00c2\u00a0Once Geinimi is installed on a user\u00e2\u20ac\u2122s phone, it has the potential to receive commands from a remote server allowing the owner of that server to control the android phone.<\/p>\n<p>Geinimi is distributed via repackaged version of legitimate applications distributed in third-party Chinese Android app markets.\u00c2\u00a0The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Few of the applications from &#8220;Unkown Source&#8221; that has been identified as containing the Geinimi includes Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. \u00c2\u00a0Even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected.<\/p>\n<p>So far security experts have found the following capabilities in Geinimi :<\/p>\n<ul>\n<li>Send location coordinates of the phone.<\/li>\n<li>Send device identifiers (IMEI and IMSI).<\/li>\n<li>Download and prompt the user to install or uninstall an app.<\/li>\n<li>Compile and send a list of installed apps to the server.<\/li>\n<li>Receive commands from the remote server.<\/li>\n<\/ul>\n<p><span style=\"line-height: 27px; font-size: medium;\">Though the malware has been found only on phones in China, nobody is sure when it will with the rest of the world including the US. <\/span><span style=\"line-height: 27px; font-size: medium;\"><a href=\"https:\/\/www.mylookout.com\/\" target=\"_blank\">Lookout Mobile Security<\/a><\/span><span style=\"line-height: 27px; font-size: medium;\"> has already released updates to protect the android phone. \u00c2\u00a0 But the best security is common sense ! \u00c2\u00a0Do not download and install all from unknown source, before you download an app, ensure its from a legitimate source and do your due diligence. \u00c2\u00a0This is another reason why I love my iPhone, since \u00c2\u00a0some kind of preliminary due diligence is done by Apple. On Sept, 2010 I wrote an <a href=\"https:\/\/techsatwork.com\/blog\/?p=712\" target=\"_blank\">article<\/a> that contained the following :<\/span><\/p>\n<p><span style=\"line-height: 27px; font-size: medium;\"><em><span style=\"color: #99cc00;\">One of the advantage of Android is its open source, so the capabilities are unlimited, but that is its disavantage too, the security on software is not as reliable as iOS.<br \/>\nApp Store is totally controlled by Apple, they review the software for security holes and stability before its put out on the App store, but Android is not like that. Most of the software available is not reviewed and is on owner\u00e2\u20ac\u2122s risk.<\/span><\/em><\/span><\/p>\n<p>Geinimi is another proof \u00c2\u00a0of this. \u00c2\u00a0Google needs to control the app market and put some kind of control like the App Store. I am pretty sure there are more Geinimi like malware that will hit the smart phone market, but until it hits the iPhone, it will be my Hero !<\/p>\n<p><span style=\"line-height: 27px; font-size: medium;\"><br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Geinimi, a sophisticated new Android Trojan has emerged from China. \u00c2\u00a0This Trojan once installed \u00c2\u00a0compromises significant amount of \u00c2\u00a0data on a Android phone and sends it to remote servers. Geinimi as been one of the most advanced \u00c2\u00a0Android malware in the wild and it has botnet-like capabilities. \u00c2\u00a0Once Geinimi is installed on a user\u00e2\u20ac\u2122s phone, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[348,4,386,260,156,1,347],"tags":[950,523,518,524,520,522,521,519],"class_list":["post-947","post","type-post","status-publish","format-standard","hentry","category-android","category-mac","category-gadgets","category-google","category-internet","category-misc","category-phone","tag-android","tag-city-defense-and-baseball-superstars-2010","tag-geinimi","tag-lookout-security","tag-monkey-jump-2","tag-president-vs-aliens","tag-sex-positions","tag-trojan"],"_links":{"self":[{"href":"https:\/\/techsatwork.com\/index.php?rest_route=\/wp\/v2\/posts\/947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techsatwork.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techsatwork.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techsatwork.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techsatwork.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=947"}],"version-history":[{"count":11,"href":"https:\/\/techsatwork.com\/index.php?rest_route=\/wp\/v2\/posts\/947\/revisions"}],"predecessor-version":[{"id":959,"href":"https:\/\/techsatwork.com\/index.php?rest_route=\/wp\/v2\/posts\/947\/revisions\/959"}],"wp:attachment":[{"href":"https:\/\/techsatwork.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techsatwork.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techsatwork.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}