IntoMobile

Breaking news, information, and analysis on the latest mobile phones and mobile technology

Open NavigationOpen Search
  • Home
  • Platforms
    • iOS / iPhone OS
    • Android
    • Windows Phone
    • BlackBerry OS
  • Hardware
    • New Hardware
    • Tablets
    • Reviews
    • Rumors
  • Carriers
    • AT&T
    • Sprint
    • T-Mobile
    • Verizon
  • Manufacturers
    • Apple
    • Samsung
    • HTC
    • LG
    • Motorola
  • Best VPNs
  • Best AI Tools

More Android spyware spotted in third-party app marketplaces

February 28, 2011 by Kelly Hodgkins - Leave a Comment

Android
Share on Twitter Share on Facebook ( 0 shares )
Android

Security researchers from NetQin Mobile discovered two new Android spyware programs called SW.SecurePhone and SW.Qieting. Similar to previous Android security threats, these two malicious programs are distributed through third-party application marketplaces and online forums. Please note that these applications are not found in the official Android Market.

SW.SecurePhone is found primarily in the US and collects phone activity including messages, call log, phone location data, recorded sounds and pictures. This data is uploaded to a remote server every 20 minutes. The Qieting variant has been found both in and outside the United States and automatically forwards all messages sent to the phone. Both pieces of Android malware pose a huge threat to privacy.

The two pieces of malware were discovered by mobile security firm NetQin. NetQin was the first company to discover the Hong TouTou trojan which surface last week. Similar to SecurePhone and Qieting threats noted above, Hong TouTou was found within apps distributed on third-party marketplaces. Though this security threat was mostly confined to app marketplaces and forums within China. The malware was found in RoboDefense (not the Android Market version, but a pirated version) and several wallpaper applications.

These recent reported threats are not the first to hit the Android platform. The Geinimi Trojan made headlines late last year. Discovered by U.S. Security firm Lookout, Geinimi’s main purpose was to analyze the user’s private information using key words, collect private information from the phone, and send it to a remote server.

[Via InformationWeek]

Share on Twitter Share on Facebook ( 0 shares )

Back to top ▴

Back to top ▴

Follow IntoMobile

38k
36k
4k
13k
12k

Most Recent Posts

  • Motorola’s 2026 Razr lineup brings minimal changes to foldable phones
  • Vivo X300 FE launches in Europe for €999 with major price increase
  • Motorola Moto G47 brings significant upgrades with FHD+ display and improved build quality
  • Samsung Galaxy A57 5G brings meaningful upgrades to the mid-range
  • Motorola’s moto g87 brings 200MP camera and ultra-bright display to mid-range smartphones

Get Updates Via E-Mail

  • This field is for validation purposes and should be left unchanged.

About IntoMobile

  • About IntoMobile
  • Contact IntoMobile
  • Send us News Tips
  • Privacy Policy

Social Links

  • IntoMobile on Facebook
  • IntoMobile on Twitter
  • IntoMobile on Google+
  • IntoMobile on YouTube

Copyright © 2006-2021 IntoMobile. All rights reserved.