Malware News Android-rooting Gooligan malware infects 1 million devices

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
At an estimated rate of 13,000 smartphones a day

A new strain of Android malware is infecting an estimated 13,000 devices per day.

The Gooligan malware roots Android devices before stealing email addresses and authentication tokens stored on them. The tokens create a means for hackers to access users' sensitive data from Gmail accounts, security researchers at Check Point Software Technologies warn.
The malicious code creates a money-making sideline for crooks by fraudulently installing apps from Google Play and rating them on behalf of the victim.

Gooligan targets devices running Android 4 (Jelly Bean, KitKat) and 5 (Lollipop), collectively around 74 per cent of Android devices currently in use. Gooligan is installing at least 30,000 apps on breached devices every day, or more than 2 million apps since the malicious campaign began, according to Check Point.

Security researchers at the Israeli firm first encountered Gooligan's code in the malicious SnapPea app last year. In August, the malware reappeared with a new variant and has since infected at least 13,000 devices per day. About 40 per cent of these devices are located in Asia and about 12 per cent are in Europe. Hundreds of the email addresses compromised by Gooligan are associated with enterprises around the world.

Check Point has passed on its findings on the campaign to Google’s security team. "This theft of over a million Google account details is very alarming and represents the next stage of cyber-attacks," said Michael Shaulov, Check Point's head of mobile products. "We are seeing a shift in the strategy of hackers, who are now targeting mobile devices in order to obtain the sensitive information that is stored on them."

Gooligan spreads when victims download and install an infected app. Crooks are slinging the malware by tricking victims into following malicious links in phishing messages.

"If your account has been breached, a clean installation of an operating system on your mobile device is required," Shaulov advised. ®

 

Dirk41

Level 17
Verified
Top Poster
Mar 17, 2016
797

Dirk41

Level 17
Verified
Top Poster
Mar 17, 2016
797
thank you , yes I read it, the problem was I did not get what tokens are.. evend if I read it on wiki XD

but no problem thank you anyway
 
  • Like
Reactions: DardiM and L S

Solarlynx

Level 15
Verified
Top Poster
Well-known
Apr 30, 2012
711
You can check HERE : = " Check Point Software Technologies: Network Security, Firewalls, and Threat Prevention Solutions " = Just open = " Gooligan Checker " = and enter your Google email address to find out if you've been hacked.

I've already checked my, it's Ok. :):)
Thanks. Glad to be not hacked.

Capture.PNG
 

Aleeyen

Level 22
Verified
Top Poster
Well-known
Nov 19, 2012
1,121
So much have been said about safety of non-rooted phones, but now malwares themselves root the phones so as to play more havoc. They
are really clever.
 
  • Like
Reactions: DardiM and L S

viktik

Level 25
Verified
Well-known
Sep 17, 2013
1,492
that why keeping sensitive data in smartphone spooks me.
 
  • Like
Reactions: L S

L S

Level 5
Verified
Well-known
Jul 16, 2014
215
thank you , yes I read it, the problem was I did not get what tokens are.. evend if I read it on wiki XD

but no problem thank you anyway
Security tokens (is) provide an extra level of assurance through a method known as (two-factor authentication / 2FA) - the user has a personal identification number (PIN), which authorizes them as the owner of that particular email or account or device, etc. then displays a number which uniquely identifies the user to the service, allowing them to log in. ;);)
 

Dirk41

Level 17
Verified
Top Poster
Mar 17, 2016
797
Security tokens (is) provide an extra level of assurance through a method known as (two-factor authentication / 2FA) - the user has a personal identification number (PIN), which authorizes them as the owner of that particular email or account or device, etc. then displays a number which uniquely identifies the user to the service, allowing them to log in. ;);)


thank you I really appreciate..and last question: and the token always works ? doesn't it expire?
 
  • Like
Reactions: L S

Axelrod Sven

Level 3
Verified
Well-known
Feb 11, 2016
132
There are so many exploits... I don't know...honestly every second day I see news about some exploit or the other. It looks as though hackers and criminals are taking this battle to Google's doorstep - and how!
 
  • Like
Reactions: L S

L S

Level 5
Verified
Well-known
Jul 16, 2014
215
thank you I really appreciate..and last question: and the token always works ? doesn't it expire?
If you have your (two-factor authentication / 2FA) 'ON' then is always 'ON' , if it's 'OFF' then is always 'OFF'. - It's up to you.
 
  • Like
Reactions: Dirk41

Dirk41

Level 17
Verified
Top Poster
Mar 17, 2016
797
If you have your (two-factor authentication / 2FA) 'ON' then is always 'ON' , if it's 'OFF' then is always 'OFF'. - It's up to you.


but for example ,every time i login in google account it sends me a different numer each time..so I meant : tokens are different every time o it is always the same?
thank you
 
  • Like
Reactions: L S

Dirk41

Level 17
Verified
Top Poster
Mar 17, 2016
797
but for example ,every time i login in google account it sends me a different numer each time..so I meant : tokens are different every time o it is always the same?
thank you


in fact here it says Security token - Wikipedia

Stolen tokens can be made useless by using two factor authentication. Commonly, in order to authenticate, a personal identification number (PIN) must be entered along with the information provided by the token the same time as the output of the token.

so then it expires, so it seems to me it's highly improbable this attack can be effective
 

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
What are Google authorization tokens ?

"A Google authorization token is a way to access the Google account and the related services of a user. It is issued by Google once a user successfully logged into this account.
When an authorization token is stolen by a hacker, they can use this token to access all the Google services related to the user, including Google Play, Gmail, Google Docs, Google Drive, and Google Photos.
While Google implemented multiple mechanisms, like two-factor-authentication, to prevent hackers from compromising Google accounts, a stolen authorization token bypasses this mechanism and allows hackers the desired access as the user is perceived as already logged in".


If you phone has been infected, you are seen logged (because you were logged when it infected it) or as soon as you will login into your account.

"If your account has been breached, a clean installation of an operating system on your mobile device is required," Shaulov advised. ®



info_3_REVISED_11.29-Copy-1-768x512.jpg


from: More Than 1 Million Google Accounts Breached by Gooligan | Check Point Blog
 
Last edited:

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
That's Ok here and good to know:

"Check Point will not collect, store, or use your email address for any other purpose."
 
  • Like
Reactions: L S and DardiM

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Gooligan spreads when victims download and install an infected app. Crooks are slinging the malware by tricking victims into following malicious links in phishing messages.

So clearly means, you will not be infected easily without falling in that trap.

Obvious if you are aware on the habits, then no untoward incident will occur. ;)
 
  • Like
Reactions: L S and DardiM

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top