Popular mobile games such as Angry Birds and Monkey Jump are being illegally copied and repackaged with code designed to steal personal information or perform other malicious functions, according to a study due to be released soon from Lookout Mobile Security. Popular mobile games such as Angry Birds and Monkey Jump are being illegally copied and repackaged with code designed to steal personal information or perform other malicious functions, according to a study due to be released soon from Lookout Mobile Security.Although companies such as Google and Apple have dedicated marketplaces for applications that have been approved, there are an increasing number of third-party sites for downloading applications, said John Hering, CEO of Lookout Mobile Security, on the sidelines of the Mobile World Congress in Barcelona on Monday.As part of its study, called the App Genome Project, Lookout examined applications in two alternative Android application marketplaces aimed at Chinese speakers. Eleven percent of the applications were merely clones of legitimate applications stuffed with other code, some of which have the potential to be malware, Hering said.One of the most commonly cloned applications is Monkey Jump, Hering said. It isn’t immediately clear what some of the code does in those tampered-with applications, but Hering said there are a few possibilities, such as creating a botnet or sending text messages to premium rate numbers. Other possibilities are that the applications are then used to sign up to advertising schemes, with the profits channeled to miscreants rather than the legitimate publisher.“We worry that this is the beginning of something very substantial,” Hering said. “If you’re downloading from a third-party alternative market, it doesn’t mean it’s a bad idea but you need to really take caution with what you’re doing. It’s hard to know what’s in there or what isn’t.” In December, Lookout discovered a piece of Android malware called “Geinimi” that contained functions similar to botnet code designed for a PC: It communicated with a command-and-control server and can issue commands to a phone remotely, such as to install or uninstall software.Hering said since that time, Lookout has discovered many more variants of Geinimi, indicating that hackers are still actively working on its code. Geinimi targeted Chinese-language speakers, and its true malicious function hasn’t been determined.“It’s clearly not a one-off thing,” Hering said. “It’s becoming a bigger and bigger issue.”On the bright side, Hering said the App Genome Study has also found that developers seem to be more aware of security and privacy issues. The number of applications in both the Android Market and Apple’s App Store that access a person’s location and contacts information has gone down slightly over the past six months. Many times applications don’t need that data, but developers were eager to use an API (application programming interface) that allowed access.“We believe that is due to the fact that developers are becoming more educated about privacy,” Hering said. “Developers are starting to be privacy- and security-conscious for their users.”Hering is due to speak later this week at the RSA conference in San Francisco. Related content news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Network Security Security news New Trojan ZenRAT masquerades as Bitwarden password manager A report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities. By Lucian Constantin Sep 28, 2023 4 mins Cyberattacks Hacking Data and Information Security news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Data and Information Security Security Practices news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe