Gooligan is a new malware in the block, has become quite a big headache for millions of Google users!
Not only for users but Gooligan is seriously a headache for Google too! Because the pattern of attack which has been identified by the researchers as off now is quite dangerous.
It has been developed to attack all the Android Smartphones running on OS version 4.0 & 5.0. But the biggest matter of worry is, as per report, 74% of all android phones are running on these two versions.
As per recent update, millions of Google user’s data has been breached by this malware, Gooligan. That’s why I raised the question in the beginning, is your Android device safe?
Because what the statistics shows, 74% of Android phones are running on Gooligan’s targeted OS versions. So it’s really a big matter of concern.
Now lets find out more about Gooligan’s pattern of attack!
It mainly targets the Authentication Data & Email Addresses stored in the phone which are running on Android version 4.0 & 5.0.
Specifically to get access of various Google services like Docs, Photos & others, as per the latest update from Check Point Software Technologies.
The Mobile product head of Check Point has mentioned it as the “Next stage of Cyber Attack”.
He has also mentioned very clearly that how the strategy of attackers/ hackers is getting shifted towards Mobile devices.
A year back this malware had been identified by their researchers & in this year’s August a modified version of Gooligan has come. That means it’s evolving!
The most shocking thing is, everyday Gooligan is affecting nearly 13000 devices. Can you imagine?
Not only that, among the attacked users, approx. 57% are from Asia and nearly 9% are from Europe. So are you getting the criticality of this incident now?
How the process begins?
Yes it’s a vital question, so that you will be able to beware of that.
The process of infection starts when anyone downloads & install any app which is already infected by Gooligan, on their Android device running on version 4.0/ 5.0 .
It’s pretty clear as you are installing an already infected app in your vulnerable device. It’s one way & the other way is by clicking on any phishing link.
So what happens next? Through this malware when the hackers get control of your device they can use it for various purposes.
Like, they can generate revenue fraudulently by downloading apps on your behalf from Google Play Store, rating any app & many other things, which a user normally does or even more. Because the hacker has got the control.
Google has mentioned that they will take the necessary steps when Check Point Software reported about their findings.
So if your Android phone is running on OS version 4.0 or 5.0, be cautious!
Source: Business Standard