On 28th January 2016, Dr.Web warned that a Trojan targeted dozens of games on Google Play. The company says that Android.Xiny.19.origin steals information including the device’s IMEI, MAC address, the network providers name, and the OS version and current language. It may also download and run an APK application package from the C&C server. Interestingly, the app is served steganographically: that is, it’s hidden in an image, presumably in the hope of avoiding detection by security software.
While the company has advised Google of the issue, as of the 28th January it seems that the apps were still present on Google Play. I don’t know if this is still the case, but even if it isn’t, the app may still be available on other sites. And, of course, the likelihood is that some people have already downloaded one of the 60+ apps affected.