December 30, 2010

Sophisticated New Android Trojan Found in Wild

DECEMBER 29, 2010

Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild

A new Trojan (“Geinimi”) affecting Android devices has recently emerged in China
  • can compromise a significant amount of personal data on a user’s phone and send it to remote servers
  • the first Android malware in the wild that displays botnet-like capabilities
  • being “grafted” onto repackaged versions of legitimate applications
  • it has the potential to receive commands from a remote server that allow the owner of that server to control the phone
  • the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet

So why am I writing about this malware, when I don't even own a smartphone?  Because the article was written by my son, Tim.

Back in July ( I wrote about how Tim moved to California, and became part of the Security Response Team at Lookout in San Francisco.

As part of his work there, Tim found and reverse-engineered this malware, helped develop Lookout's protection for it, and created this writeup.

As we say in New England, Tim is Wicked Smaht and works Wicked Hahd.

And his Mom and Dad are Wicked Proud!

see also:

According to Tim:
It's "Geinimi" not "Gemini", and pronounced "Ghay-knee-mē" - translates from Chinese to roughly "Give me rice"

And here's the followup teardown Tim wrote:

This article originally appeared in my blog: All Things Quality
My name is Joe Strazzere and I'm currently a Director of Quality Assurance.
I like to lead, to test, and occasionally to write about leading and testing.
Find me at

No comments:

Post a Comment