Over 1 million Google accounts breached by Gooligan: Check Point

December 1, 2016

New Delhi, Dec 1: A new variant of an Android malware called "Gooligan" is believed to have breached the security of over one million Google accounts.

GoogleAccording to security firm Check Point Software Technologies, the malware roots Android devices and steals email addresses and authentication tokens stored on them.

This can give attackers access to users' sensitive data from Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite, it said.

"This theft of over a million Google account details is very alarming and represents the next stage of cyber- attacks. We are seeing a shift in the strategy of hackers, who are now targeting mobile devices in order to obtain the sensitive information that is stored on them," Check Point's head of mobile products Michael Shaulov said.

No immediate comment could be received from Google on the matter. Check Point's report said the malware campaign infects 13,000 devices each day and that Gooligan targets devices on Android 4 (Jelly Bean, KitKat) and 5 (Lollipop), which represent nearly 74 per cent of Android devices in use today.

About 40 per cent of these devices are located in Asia and about 12 per cent are in Europe.

After attackers gain control over the device, they generate revenue by fraudulently installing apps from Google Play and rating them on behalf of the victim, the report said.

"Every day Gooligan installs at least 30,000 apps on breached devices, or over 2 million apps since the campaign began," it added.

The infection begins when a user downloads and installs a Gooligan-infected app on a vulnerable Android device, or by clicking on malicious links in phishing attack text messages.

Check Point said it has reached out to the Google security team immediately with information on this campaign.

"We appreciate Check Point's partnership as we've worked together to understand and take action on these issues. As part of our ongoing efforts to protect users from the Ghost Push family of malware, we've taken numerous steps to protect our users and improve the security of the Android ecosystem overall," Google's director of Android security Adrian Ludwig was quoted as saying.

Among other actions, Google has contacted affected users and revoked their tokens, removed apps associated with the Ghost Push family from Google Play, and added new protections to its Verify Apps technology.

Check Point"s Mobile Research Team first encountered Gooligan's code last year and in August this year, the malware reappeared with a new variant and has since infected at least 13,000 devices per day.

Check Point is offering a free online tool that allows users to check if their account has been breached.

"If your account has been breached, a clean installation of an operating system on your mobile device is required. For further assistance, you should contact your phone manufacturer or mobile service provider," Shaulov said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 26,2020

New Delhi, Feb 26: With the government pushing for the disinvestment of Air India, industrial conglomerate Adani Group may emerge as one of the bidders for the debt-laden national carrier, sources said.

According to highly placed sources, the Group has held internal rounds of deliberations on whether or not to submit an Expression of Interest (EoI) and the discussions are still in the preliminary stage.

If the company actually submits an EoI, it would be a major move towards further diversification of the company which has business interests across sectors right from edible oil, food to mining and minerals. 

It also entered into airport operations and maintenance business and won bids for privatisation of six airports, Ahmedabad, Lucknow, Jaipur, Guwahati, Thiruvananthapuram and Mangaluru in 2019. 

On being contacted by IANS, the company did not comment on the matter.

Air India is one of the most important divestment proposals for the current fiscal to reach the huge Rs 2.1 lakh crore target.

The government in January restarted the divestment process of the airline and invited bids for selling 100 per cent of its equity in the state-owned airline, including Air India's 100 per cent shareholding in AI Express Ltd. and 50 per cent in Air India SATS Airport Services Private Ltd.

After its unsuccessful bid to sell Air India in 2018, the government this time has decided to offload its entire stake. In 2018, it had offered to sell its 76 per cent stake in the airline.

Of the total debt of Rs 60,074 crore as of March 31, 2019, the buyer would be required to absorb Rs 23,286 crore.

Air India, along with its subsidiary Air India Express, has a total operational fleet of 146 aeroplanes.

Further, the disinvestment department has extended the last date for submission of written queries on the Performance Information Memorandum and Share Purchase Agreement to March 6.

The last date for submission of written queries on PIM and SPA was originally set for February 11, following which the Department of Investment and Public Asset Management (DIPAM) on February 21 issued 20 clarifications on the queries raised and expected.

Any delay in the tentatively rolled out timeline would also delay DIPAM's plan to identify the pre-qualified bidders by March 31 and the financial bids invitation as well. It is expected to take more than two months after the selection of the pre-qualified bidders to complete Air India's sale.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 5,2020

With the scrapping of Mitron and Remove China Apps from its Play Store gaining a lot of attention in India, Google on Thursday said that it removed a video app "for a number of technical policy violations", while adding that it also does not allow an app that "encourages or incentivizes users into removing or disabling third-party apps".

Both the apps became immensely popular in India within a short span of time due to the prevailing anti-China sentiment amid border tensions between India and China in Ladakh and calls by Indian activists to boycott Chinese products.

Reports suggested that the Mitron app is a repackaged version of TicTic, which is a TikTok clone.

The Remove China Apps was designed to help users identify applications of Chinese origin.

Without naming the apps, Google hinted that the Mitron app may make a comeback on the Play Store once it fixes some technical issues, but the chances of the Remove China Apps are thin.

"We have an established process of working with developers to help them fix issues and resubmit their apps. We've given this developer (of the video app) some guidance and once they've addressed the issue the app can go back up on Play," Sameer Samat, Vice President, Android and Google Play, said in a statement.

Google said that its Android app store was designed to provide a safe and secure experience for the consumers while also giving developers the platform and tools they need to build sustainable businesses.

Samat said that Google Play recently suspended a number of apps for violating the policy that it does not allow an app that "encourages or incentivizes users into removing or disabling third-party apps or modifying device settings or features unless it is part of a verifiable security service".

"This is a longstanding rule designed to ensure a healthy, competitive environment where developers can succeed based upon design and innovation. When apps are allowed to specifically target other apps, it can lead to behaviour that we believe is not in the best interest of our community of developers and consumers," Samat said.

"We've enforced this policy against other apps in many countries consistently in the past - just as we did here," he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.