Check Point Technologies identified Gooligan malware code in a number of fake apps available in third-party Android app stores. The names of apps vary from shady (“Demm,” “com.example.ddeo”) to seemingly safe (“WiFi Enhancer,” “StopWatch”). When unwitting users download one of the fake apps, their account becomes infested with the malware.
Approximately 57 percent of the 1 million breached accounts are in Asia. Another 19 percent are in the Americas, 15 percent are in Africa and 9 percent are in Europe. However, the number of breached accounts continues to increase at 13,000 devices per day.
Check Point Technologies contacted Google with the information it uncovered. “We’re appreciative of both Check Point’s research and their partnership as we’ve worked together to understand these issues. As part of our ongoing efforts to protect users from the Ghost Push family of malware, we’ve taken numerous steps to protect our users and improve the security of the Android ecosystem overall,” said Google Director of Android Security Adrian Ludwig.
Google is taking steps to inform affected users.
More articles on IT:
Innovaccer unveils MIPS calculator to help providers estimate payments
How Phoebe Putney cut costs by nearly $500k
American Well, Tyto Care partner for telehealth services
At the Becker's 11th Annual IT + Revenue Cycle Conference: The Future of AI & Digital Health, taking place September 14–17 in Chicago, healthcare executives and digital leaders from across the country will come together to explore how AI, interoperability, cybersecurity, and revenue cycle innovation are transforming care delivery, strengthening financial performance, and driving the next era of digital health. Apply for complimentary registration now.