Following earlier reports of a number of Android apps which were distributing the Droid Dream malware, mobile security company Lookout published more details of the malicious software. The company says that Droid Dream has been found “residing in third-party markets targeting mainly Chinese users;” that it sends IMEI, IMSI, device model and SDK version to a remote command and control server; and that the two weaknesses it exploits have been patched in Android 2.3 (Gingerbread).