5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

Check Point: More Than 1M Google Accounts Breached by New Android Malware

By Diana Goovaerts | November 30, 2016

More than 1 million Google accounts have already been compromised and thousands more are being breached every day by a new malware campaign targeting Android devices running old versions of the operating system, cyber security firm Check Point Software Technologies said Wednesday.

Check Point said it is working with Google’s Security team to address the threat, which has been dubbed “Gooligan.”

A variation of the 2014 “Ghost Push” malware family, Gooligan attacks mobile devices running Android 4 (Jelly Bean and KitKat) and 5 (Lollipop) to gain access. Check Point and Google said Gooligan’s focus is to root devices and generate revenue by fraudulently installing apps from Google Play and rating them using the victim’s credentials.

According to Check Point, the door to infection is opened when a victim downloads and installs a Gooligan-infected app on their Android device, or clicks on malicious links in phishing messages. Check Point said more than 1 million Google accounts have already been compromised, and 13,000 new devices are infected by the malware each day. Over 2 million apps have fraudulently been installed since the campaign began, the firm said. Around 40 percent of impacted devices are in Asia and 12 percent are in Europe, Check Point stated.

While Check Point noted a rooted device could expose a victim’s Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite data, Google said it has not found signs of other fraudulent activity within the affected Google accounts.

Still, given that nearly three quarters of Android devices in use today run Android 4 or 5, Check Point said the threat is incredibly concerning and marks a shift in malware attack strategy.

“This theft of over a million Google account details is very alarming and represents the next stage of cyber-attacks,” Check Point’s Head of Mobile Products Michael Shaulov said. “We are seeing a shift in the strategy of hackers, who are now targeting mobile devices in order to obtain the sensitive information that is stored on them.”

Google Director of Android Security Adrian Ludwig said in a blog post the company has already taken steps to strengthen the Android ecosystem via the deployment of “Verify Apps” improvements and the removal of apps associated with Ghost Push from the Play store. Google said it is also working with the Shadowserver Foundation and several major Internet service providers that provided infrastructure used to host and control the malware to disrupt future attacks.

Additionally, Check Point said it is offering a free online tool that allow users to check if their account has been breached.

“If your account has been breached, a clean installation of an operating system on your mobile device is required,” Shaulov noted. “This complex process is called flashing, and we recommend powering off your device, and approaching a certified technician or your mobile service provider, to re-flash your device.”


Filed Under: Apps

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

12 nm silicon IP integrates multi-standard connectivity
series-parallel RC RL calculator
Online RF calculators help engineers
Ethernet analyzer decodes wireless protocols in wireline networks
EDA software adds support for tower semiconductor SiGe

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World