Date:01/12/16
"We believe that it is the largest Google account breach to date," the security firm said in a blog post.
The malware, called Gooligan, has been preying on devices running older versions of Android, from 4.1 to 5.1, which are still used widely, especially in Asia.
Gooligan masquerades as legitimate-looking Android apps. Checkpoint has found 86 titles, many of which are offered on third-party app stores, that contain the malicious coding.
Once Gooligan is installed, it attempts to root the device, as a way to gain full control. The malware does this by exploiting well-known vulnerabilities in older versions of Android.
"These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user," Checkpoint said.
Gooligan will then go on to steal the user's Google authorization tokens, giving the malware access to Gmail, Google Play, and other related services.
Of the 1 million Google accounts breached, 19 percent were based in the Americas, 9 percent in Europe, while 57 percent were in Asia, according to Checkpoint.
By gaining access to users' Google accounts, the malware is likely attempting to generate revenue for its creators. It does this by installing apps promoted by legitimate advertising networks, and then writing positive reviews for them on Google Play. "An attacker is paid by the network when one of these apps is installed successfully," Checkpoint said.
Security researchers first noticed an earlier version of Gooligan last year, when it appeared in the malicious SnapPea app. It wasn’t until this past summer that the malware reappeared with upgraded processes.
Checkpoint has published a website that lets users check if their Google account was breached by Gooligan.
Security experts also caution users should avoid downloading apps from third-party app stores. This is because these stores often do little to verify that the apps offered are safe for use.
The creators of Gooligan are also spreading the malware by sending SMS text messages to unsuspecting victims containing links to download apps carrying the harmful coding.
Google didn’t immediately respond to a request for comment. But Checkpoint said that Google is investigating the matter and revoking authentication tokens that were stolen by the malware.
Android malware steals access to more than 1 million Google accounts
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint."We believe that it is the largest Google account breach to date," the security firm said in a blog post.
The malware, called Gooligan, has been preying on devices running older versions of Android, from 4.1 to 5.1, which are still used widely, especially in Asia.
Gooligan masquerades as legitimate-looking Android apps. Checkpoint has found 86 titles, many of which are offered on third-party app stores, that contain the malicious coding.
Once Gooligan is installed, it attempts to root the device, as a way to gain full control. The malware does this by exploiting well-known vulnerabilities in older versions of Android.
"These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user," Checkpoint said.
Gooligan will then go on to steal the user's Google authorization tokens, giving the malware access to Gmail, Google Play, and other related services.
Of the 1 million Google accounts breached, 19 percent were based in the Americas, 9 percent in Europe, while 57 percent were in Asia, according to Checkpoint.
By gaining access to users' Google accounts, the malware is likely attempting to generate revenue for its creators. It does this by installing apps promoted by legitimate advertising networks, and then writing positive reviews for them on Google Play. "An attacker is paid by the network when one of these apps is installed successfully," Checkpoint said.
Security researchers first noticed an earlier version of Gooligan last year, when it appeared in the malicious SnapPea app. It wasn’t until this past summer that the malware reappeared with upgraded processes.
Checkpoint has published a website that lets users check if their Google account was breached by Gooligan.
Security experts also caution users should avoid downloading apps from third-party app stores. This is because these stores often do little to verify that the apps offered are safe for use.
The creators of Gooligan are also spreading the malware by sending SMS text messages to unsuspecting victims containing links to download apps carrying the harmful coding.
Google didn’t immediately respond to a request for comment. But Checkpoint said that Google is investigating the matter and revoking authentication tokens that were stolen by the malware.
Views: 422
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World