
The test utilized a crafted attack tool and a fake Wi-Fi hotspot to spy on data transmitted from the apps. In many cases, the researchers were able to retrieve login credentials for banking, email, social media or corporate networks. They could also disable security programs or spoof them into labelling secure apps as infected, and in cases could even inject code into the data stream and force apps to carry out specific commands.
Since the researchers intentionally focused on popular apps, some of the tested apps have clocked up millions of downloads.
Read more (PDF): http://www2.dcsec.uni-hannover.de/files/android/p50-fahl.pdf