Flappy Bird clone hacking plans revealed

A group of hackers who stole naked photos of more than 100 female celebrities planned to carry out another attack using a cloned version of Android game Flappy Bird.

The clone included malware that could be used to maliciously gather photos of users and send them to a remote location for distribution in the same way they managed to leak pictures from celebrities' iCloud accounts last week.

The hackers thought they would be able to take advantage of users automatically accepting the permissions when they install an app from the Play Store.

The ring also thought it would be able to download the pictures before Google noticed and blocked the app.

The plans were revealed on image board AnonIB, part of 4chan, where the celebrity photos were being offered for sale.

A security researcher discovered the post on the leak site in July, which boasts a user only needs to use the app once to get the photos.

However, it seems as though the poster was a little concerned about getting their existing developer account blocked. After explaining what he hoped to do, they said: "It's a violation of a google play developers license to publish sneaky apps like that, and I REFUSE to risk my license over it.

"...If any kind anons want to help me get the thing paid for, I will post any wins obtained in this thread. I will link the app's store entry here, you get girls to download and play it ONCE, and you'll get all the win you wanted, if it was there," the post said.

In July, it was revealed a new remote access Trojan malware could be used to hack and target mobile banking data, SMS messages and contact lists on Android phones.

Although there's no evidence to suggest it could steal photos, it is able to install malicious app updates, steal and send SMS messages.