Geinimi Trojan Attracts attention of Information Security Professionals 


by iClass - Tuesday, January 04, 2011
Recent years have witnessed tremendous growth in mobile phone usage across the world. Constant improvement in technologies and arrival of new devices including Blackberry, iPad, iPod and smart phones, which add to user convenience and experience have played a considerable role in increasing mobile phone usage. Another factor has been their increased penetration in emerging countries such as China and India. However, the popularity of mobile devices also makes them susceptible to attacks from hackers.

Recently,a new Trojan named Geinimi has attracted the attention of information security professionals. The Trojan created in the wild in China affects the Android operating system. Criminals may use the Trojan to gain access to personal data on mobile phones and redirect them to remote servers. Security researchers consider Geinimi as first Android malware, which has botnet-like features. Unwary mobile phone users may inadvertently download a seemingly legitimate but fake application loaded with Geinimi Trojan.

Once inserted on a mobile phone, a remote attacker can direct commands to the Trojan and gain control over the phone. Geinimi may help the remote attacker to track the location of the mobile user, gain International Mobile Equipment Identity (IMEI) and International Mobile Subscriber Identity (IMSI) numbers, automatic download of malicious files. The mobile user may be lured frequently to install and install applications. The attacker may also direct the Trojan to share the list of installed files.
IT professionals may use ethical hacking to evaluate the security of mobile phones and applications.

The tests may help an organization to understand the security threats in the mobile environment and initiate measures to prevent installation of Trojans, botnets and all forms of attacks from hackers. Some of the security evaluation tests on mobile devices include payload injections, social engineering attack and penetration tests.

Information stored in mobile phones is crucial not only for individuals, but also organizations such as intelligence agencies, law enforcement authorities, banks and financial institutions among others. The stored data may be highly significant for the aforesaid organizations as they may be useful for the successful completion of investigations and legal obligations. As such,information security needs due emphasis from IT security specialists.

EC-Council provides industry training and certification for information security professionals in ethical hacking among many other specializations. “Understanding how hackers exploit these vulnerabilities is a key requirement to hardening software and hardware. That is why EC-Council focuses on ethical hacking as an approach to information security evaluation” as stated by EC-Council’s Senior Director, Steven Graham. EC-Council through its Certified Ethical Hacker program has trained such information security professionals from all over the world.


The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cybersecurity and e-commerce skills. It is the owner and developer of 16 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT). Its certificate programs are offered in over 60 countries around the world. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. federal government via the Montgomery GI Bill, Department of Defense via DoD 8570.01-M, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates EC-Council University and the global series of Hacker Halted security conferences. The global organization is headquartered in Albuquerque, New Mexico.

Press Contact

Steve Graham
6330 Riverside Plaza Ln NW
Suite 210
Albuquerque, NM 87120


General | Categories: technology, internet
0    submitted by iClass -
Read More Press Releases

PDP Pays Protestors against Buhari

What Causes an Underbite?

Ziqitza Healthcare Ltd aims to revitalise their on the go medical services

All Kids Braces Medical Card is now Available in Evanston through iDentity Orthodontics

'Home seekers looking to home loan interest rate cuts from RBI in Feb’: Niranjan Hiranandani

Hiranandani Group’s new foray into Dream Project of PMO Narendra Modi with commercial establishmens in GIFT City, Gandhinagar, and Gujarat

Isle of Man court stays order against Hiranandani

Thane the ideal ‘luxe living’ residential destination: Niranjan Hiranandani

Clipping Creations India Offer Multiple Service in Photo Editing

Practitioner seeks state funds to widen study of naprapathy to treat vets’ PTSD

Get press releases by email