The malware then gathers some identifying information from the phone, including its IMEI number, IMSI number, packages installed and other data, and then sends it off to a pre-configured remote server.Related Posts iOS Vulnerability Could Force Devices Into Endless Reboot Loop