Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Gooligan malware roots 1M Android phones in "largest Google account breach to date"

Source: Check Point Software Technologies

Last updated

A new strain of Android malware dubbed "Gooligan," thought to be "the largest Google account breach to date," is already in active circulation and three-fourths of the Android installed base is vulnerable. Once infected, devices give hackers access to the users' Gmail, Google Photos, Docs, Drive and other Google services accounts.

Discovered by Check Point Software Technologies, the "new and alarming malware campaign" was found to have already compromised one million Google accounts, and is currently spreading to 13,000 new users each day.

The Gooligan malware is spread through phishing campaigns or malware installed via third party app stores. Once on the device, it sucks up local data, gains root access and downloads a module that enables it to steal the users's email account and Google's authentication tokens that provide it password-free access to the user's Google Photos, Google Play account, files in Google Docs and Google Drive and G Suite.

Stolen authentication tokens bypass various Google security mechanisms, including two-factor-authentication, by allowing the malware that gains control of them to appear to be the already-logged in, legitimate user. Stolen authentication tokens bypass various Google security mechanisms, including two-factor-authentication, by allowing the malware that gains control of them to appear to be the already-logged in, legitimate user

Check Point reported that 57 percent of those hacked are in Asia, but 19 percent are in America and 9 percent are located in Europe. Devices running Android 4 Jelly Bean or KitKat and Android 5 Lollipop are vulnerable. According to Google's latest data from earlier this month, that amounts to 74 percent of all Android users.

The security firm recommends that users who have been compromised do a clean install of the OS via "flashing," which it says "is a complex process."

Check Point added, "we recommend powering off your device and approaching a certified technician, or your mobile service provider, to request that your device be 're-flashed.'"

The group also noted that it "found traces of the Gooligan malware code in dozens of legitimate-looking apps on third-party Android app stores. These stores are an attractive alternative to Google Play because many of their apps are free, or offer free versions of paid apps."

Beyond third party stores, the Gooligan malware "could also be downloaded by Android users directly by tapping malicious links in phishing attack messages," the security firm noted.

The malware exploits two vulnerabilities that Google has patched, but Check Point noted that "these exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user."

The malware is monetized both when it logs into Google Play and posts fake app reviews that raise the reputation of apps, and also when it installs further adware to generate direct revenue. The malware also spoofs device IMEI serial numbers to appear to download apps more than once, inflating the app install count of apps that pay for installs.

Apple has benefitted tremendously from Google's inability to secure Android. Apple's iOS holds a commanding share of premium phone sales worldwide and maintains a strong lead in security sensitive market segments including government and corporate enterprise users. Virtually all of Apple's users are on the latest iOS update and most are frequently patched, making it far harder and less lucrative for malware vendors to exploit old iOS security flaws.



45 Comments

applesauce007 17 Years · 1703 comments

OMG.  Quick, trash that Android phone and buy an iPhone,  Do it now, now now!

gatorguy 13 Years · 24627 comments

A new strain of Android malware dubbed "Gooligan," thought to be "the largest Google account breach to date," is already in active circulation and three-fourths of the Android installed base is vulnerable. Once infected, devices give hackers access to the users' Gmail, Google Photos, Docs, Drive and other Google services accounts.

Inaccurate. In truth only around 8% of active Android devices are vulnerable. 92% of the older Android 4 and 5 smartphones are shielded from the exploits via Verify Apps which protects those users who intentionally bypass security settings to sideload apps from unofficial 3rd party sites. (This malware isn't in the Play Store) . If you read Checkpoints comments I believe they themselves pointed that out.

 EDIT: Yes they did.
 "Check Point also notes that Google's "Verify Apps" technology has been updated to deal with apps using vulnerabilities like this. That's significant because, while it doesn't help devices that are already compromised, it roadblocks future installations on 92 percent of active Android devices, even without the need for firmware updates." "So as significant as a million compromised accounts sounds, this is also an example of Google's security strategy for app-based malware working as designed, blocking installations of affected apps across the vast majority of the ecosystem."

macplusplus 9 Years · 2116 comments

Is there anyone out there who still wants iMessage for Android? ;-) All Google keys are stolen by the malware... Apple keys would be stolen too...

sirlance99 11 Years · 1301 comments

OMG.  Quick, trash that Android phone and buy an iPhone,  Do it now, now now!

Why? Most don't even have to worry about it. Also if you only go for the premium Androids that would compare to the iPhone, you definitely don't need to worry about it. Also by just staying in the Google Play Store. 

The people that did get infected would not like the iPhone as they wanted free apps that were paid ones because they went to a third party store to even get infected.