‘Gooligan’ Malware Is Dangerous: How Millions Of Android Device Breached The Security Measures Of Google?

By Michael Davis - 01 Dec '16 19:45PM
  • Google Plans To Go Public On The Market
  • (Photo : David Paul Morris/Getty Images) MOUNTAIN VIEW, CA - MAY 4: Google's headquarters in Mountain View, California is shown in this photo on May 4, 2004. Google Inc., the world's No. 1 Web search provider, filed with U.S. regulators on April 29, 2004 to become a publicly listed company and sell as much as $2.7 billion in stock in a widely expected initial public offering.

Malware is attacking cyber consumer and it started security breached to millions of Google Accounts estimated affecting thirteen thousand devices a day. "Gooligan" salvages email credentials and authentication tokens kept on Android Devices.

The authentication tokens are obtained unnecessarily from its user and this will allow hackers to use their data on Google products such as Google Photos, Google Play, Google Docs, Google Drive, and Gmail, everything that Google covers. Check Point made the necessary move to reach Google Security Team.

Google's director of Android security Adrian Ludwig said, "We're appreciative of both Check Point's research and their partnership as we've worked together to understand these issues." He added they took the necessary steps to protect the users, remove the malware affecting Android Devices through Google, and develop better security features.

The Proportioned affected devices on data based on the continent taking at least 40% of Asia and 12% in Europe. Cleared further, it targets android user using Android Jelly Bean, KitKat, and Lollipop which represent 74% of Android Users, reported on Mirror. There are measures to identify if your device is "gooligan" affected. "If your account has been breached, a clean installation of an operating system on your mobile device is required," said a source. Make sure to check that the applications being downloaded in the future are "gooligan" free.

"Gooligan" works like this, an attacker equipped with a server and it programmed an application which is phished so consumer will download it to their android devices. Once installed, it injects code into "Google Play" which makes it download other applications that helps steal email accounts and authentication tokens. It then Roots device and download a new module. After the malware collects data about the device and download root kits.

Experts advice to always get aware of the application before downloading. In fact, it says never download un-trusted applications that are new further self-research must require before taking any other action. 

 

Fun Stuff

See More <<

Editor's pick

Join the Conversation

The Next Read

Real Time Analytics