So, first of all, I'm extremely grateful to have found this tread.
HOWEVER, it comes a little late. I just got my phone a couple weeks ago, and in my excitement, I downloaded what I thought was an official google calendar app without checking the credentials of the developer or closely looking at the permissions (You must attempt to imagine how much of an idiot I feel like right now. Do it. Just put yourself in my position. Also, it seems ridiculous that it wouldn't occur to me that I wouldn't have to download an official google calendar, but I implore you not to embarrass me further).
What follows are the details of my experience with the app "Google Calendar" by the 'developer' "App for Android". You can scroll down to the bolded questions I have resulting from this experience, if you find me too long-winded.
I started seeing tons of ads on my notification bar AND on my desktop, but couldn't figure out which app put them there (I have been trying out many since I got my phone). Finally, I took to the 'net and found out about Airpush and Addons detector. Both pointed to this "Google Calendar" app. I couldn't, for the life of me, figure out why Google would push ads via Airpush and Leadbolt.
I went to the marketplace/Google Play to see what had been written about this app, but when I pulled up "My Apps" from Google Play, the app was not visible at all. I dismissed this as probably due to the fact that it was "an official app" and I couldn't uninstall it from the marketplace for that reason. It wasn't until I went to Running Services, that I saw the offending service that I realized I COULD uninstall it, and, quickly, I did!
After searching for it on Google Play again, I saw it somewhere on the fourth or fifth page when searching for "google calendar". It had a rating of 4.9 stars with 14 ratings, and the first review said "Great App!" (Again, please do not point out the ignorance/stupidity on my part.) So I didn't even think much when I installed it for these reasons.
Upon further inspection, I saw the following requested permissions:
________________________________________________________________
THIS APPLICATION HAS ACCESS TO THE FOLLOWING:
YOUR LOCATION
FINE (GPS) LOCATION
Access fine location sources such as the Global Positioning System on the device, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
COARSE (NETWORK-BASED) LOCATION
Access coarse location sources such as the cellular network database to determine an approximate device location, where available. Malicious applications can use this to determine approximately where you are.
NETWORK COMMUNICATION
FULL INTERNET ACCESS
Allows an application to create network sockets.
YOUR PERSONAL INFORMATION
READ BROWSER'S HISTORY AND BOOKMARKS
Allows the application to read all the URLs that the Browser has visited, and all of the Browser's bookmarks.
WRITE BROWSER'S HISTORY AND BOOKMARKS
Allows an application to modify the Browser's history or bookmarks stored on your device. Malicious applications can use this to erase or modify your Browser's data.
PHONE CALLS
READ PHONE STATE AND IDENTITY
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
STORAGE
MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD CONTENTS
Allows an application to write to the USB storage. Allows an application to write to the SD card.
SYSTEM TOOLS
PREVENT DEVICE FROM SLEEPING
Allows an application to prevent the device from going to sleep.
("Show all" reveals the following
HARDWARE CONTROLS
CONTROL VIBRATOR
Allows the application to control the vibrator.
YOUR LOCATION
ACCESS EXTRA LOCATION PROVIDER COMMANDS
Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources.
NETWORK COMMUNICATION
VIEW NETWORK STATE
Allows an application to view the state of all networks.
SYSTEM TOOLS
AUTOMATICALLY START AT BOOT
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the application to slow down the overall device by always running.
________________________________________________________________
So I decided to contact the developer to ask how the app worked exactly, why it needed so many permissions, and to complain about the ads. I'm still an idiot at this point, because I didn't notice that the contact email was "contact@gmail.com". I then got a delivery-failure notice, and went back to the Play website to click on the developer link which took me to "ww1.www.com"... And then I saw the developer's name is/was "App for Android".
Here is where I realized the extent of my stupidity.
(Looking at his/her other app, "Faster Hotmail" showed complaints of ads, too. At the play website, the html string for his/her page is "store/apps/developer?id=App+for+Android" in case you want to see.)
Naturally, I left a rating and a comment and reported the app to Google. Balance was restored to my phone, as the app was now gone, and I had taken the necessary actions available to me to attempt to deter/protect others from downloading the app.
But then I started to wonder: I gave this app my google credentials. Was this simply an adware app? Was it spyware?? Was it trying to phish my credentials??? Is it possible that it was malware and it rooted my phone/installed a backdoor to my phone that I don't know about????
I downloaded Lookout, and although the scan didn't find anything, I also ran the scan with the app installed, and it didn't find the app as malicious. I am in the middle of changing the passwords of several accounts that I accessed from my phone, (I don't use the same password for any two accounts, have a password manager, and am aware that passwords should be changed frequently anyway, so this isn't a big deal.) But I'm still worried.
Thus, my arrival at these forums and this post. I humbly ask for the community's advice. I am, perhaps, too paranoid, but I want to be more careful than I originally was.
My questions are:
1) Is there a safe/verified way to check if an app has rooted my phone?
2) If my phone has been compromised, is the only/best solution to do a factory reset? (Please tell me that a factory reset will work.)
3) Is there anything else that I should do that I haven't mentioned/done already?
Please help/advise
