Lookout Mobile Security, said it has identified the peskiest cellphone threat to date. "The Android Trojan, dubbed "Geinimi," has cropped up in China and is capable of taking a significant amount of personal data and sending it to remote servers."
Lookout said Geinimi displays botnet-like qualities and is the most sophisticated wireless malware it has seen. Thus far, infected programs have only been seen on various Chinese app stores.
"Geinimi is effectively being "grafted" onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets," Lookout said. "The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions."
"To download an app from a third-party app store, Android users need to enable the installation of apps from "Unknown sources" (often called "sideloading"). Geinimi could be packaged into apps for Android phones in other geographic regions. We've not seen any apps compromised by the Geinimi Trojan in the official Google Android Market.
There're a number of apps--typically games--we've seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010," said Lookout.
The security firm said it has already updated both the paid and free versions of its software to protect against Geinimi.