Android Gooligan: If you have an Android smartphone, you might want to check if it's broken. A new Android malware that has already breached over 1 million Google accounts and infects about 13.000 devices every day.
They called it Gooligan and can root Android devices to steal email addresses post officeand authentication tokens that are stored.
With this information attackers are able to hack into your Google account and gain access to sensitive information from Google apps such as Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite.
The researchers βρήκαν ίχνη του κώδικα του Gooligan σε δεκάδες νόμιμες εφαρμογές αναζήτησης Android που υπάρχουν σε apps Stores τρίτων. Αν χρησιμοποιήσετε κάποια από αυτές τις εφαρμογές στην Android device your, the malware starts sending the information inside it to the hacker's (C&C) server.
“Gooligan then downloads a rootkit from C&C server which can exploit several Android 4 and 5 vulnerabilities including the known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153),” the researchers said.
"If the root is successful, the attacker has complete control of the device and can execute privileged commands remotely."
According to CheckPoint security investigators, who unveiled the malware, any user of an earlier version of the Android operating system (4.x Android Jelly Bean, KitKat and 5.x, Lollipop is at risk.) These are available at 74% of Android devices in use today.
"These exploits can hit many devices today, because the security patches that fix them may not be available for some versions of Android, or were not installed by the user," the researchers added.
Once he has violated any Android device, Gooligan starts generating revenue for hackers by buying applications from the Google Play Store and writing reviews on behalf of the phone owner. Malware also installs adware to generate extra revenue to hackers.
Google's official position on the issue, as we received from the company:
"We appreciate its contribution Check Point with which we have worked together to understand and deal with such issues. It is worth highlighting that in our ongoing effort to protect users from the "family" of malware Ghost Push, we have taken numerous measures and we are taking protective measures to improve security throughout our ecosystem Android. In particular, our actions include: the revocation of token Google Accounts of users whose devices have been infected, providing clear instructions to reconnect safely, disabling related applications from infected devices, ongoing development of verification applications, and ongoing improvements of SafetyNet to protect users from these applications in the future and our collaboration with ISPss) to eliminate this malware completely. "
Adrian Ludwig, Android Security Director
How to check if your Google Account has been compromised?
Check Point has published an online tool to help you check if your Android-running device is infected with malicious Gooligan software. Just open “Gooligan Checker” and enter your email address (Google) to find out if you have been hacked.
If you find yourself contaminated by yourself, Adrian Ludwig, director of Google's Android security, recommends that you perform a clean installation of the operating system on your device.
Let's mention that with this tool Check Point will collect as many emails as it has never collected since it started operating…
https://gooligan.checkpoint.com/