Android malware campaign 'targets 1 million Google accounts'

Check Point says Android malware campaign can steal tokens from Google accounts

More than one million Google accounts have been compromised by a new authentication-theiving malware campaign called Gooligan, according to security company Check Point.

In a blog post, Check Point said the malware steals authentication tokens from infected Android devices, which can later be used to access Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive and other data stored with Google.

The Gooligan malware campaign appears to affect 74% of in-market devices, particularly those running on Android 4 (JellyBean, KitKat) and 5 (Lollipop).

Around 57% of these devices are in Asia and 9% are in Europe. Android users can check whether their account is compromised here.

Check Point suggested that, if an account has been breached, users should carry out a clean installation ("flashing") of the operating system on the affected mobile device. As this is a complicated process, however, the company said users may want to power off the device and ask their mobile service provider or a certified technician to 're-flash' the device.

Check Point also recommended changing all Google account passwords once the "flashing" process is complete.

The security company is working closely with Google to investigate the source of this campaign.

Adrian Ludwig, Google's director of Android security, said: "We're appreciative of both Check Point's research and their partnership as we've worked together to understand these issues. As part of our ongoing efforts to protect users from the Ghost Push family of malware, we've taken numerous steps to protect our users and improve the security of the Android ecosystem overall."

To counteract the malware campaign, Google is reportedly notifying affected accounts, revoking affected tokens and deploying SafetyNet improvements.

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Recommended

Gmail vs Outlook.com: Which one is better?
email providers

Gmail vs Outlook.com: Which one is better?

26 Nov 2021
RATDispenser evades nine in ten anti-virus engines
Security

RATDispenser evades nine in ten anti-virus engines

24 Nov 2021
Pizza chain exposed 100,000 employees' Social Security numbers
data breaches

Pizza chain exposed 100,000 employees' Social Security numbers

19 Nov 2021
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

19 Nov 2021

Most Popular

Microsoft 365 prices to soar by 20% for pay monthly subscribers
Managed service provider (MSP)

Microsoft 365 prices to soar by 20% for pay monthly subscribers

7 Dec 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
What is single sign-on (SSO)?
single sign-on (SSO)

What is single sign-on (SSO)?

2 Dec 2021