“Geinimi is effectively being ‘grafted’ onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets,” Lookout said on Wednesday. “The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions.”
Lookout also said that Geinimi displays botnet like qualities and is the most sophisticated wireless malware it has seen, and it is not entirely sure what this Trojan is capable of once if it finds a way.
But, possibilities are their like, it will be able to create “a malicious ad-network to an attempt to create an Android botnet”. They collect a device’s unique identifiers such as IMEI and IMSI and after every five minutes it will attempt to connect to one of the domains to which it has been made to direct, and if the connection is successful, then it transmits the information’s.
0 comments:
Post a Comment
Please left your comment below