Android malware campaign 'targets 1 million Google accounts'

Check Point says Android malware campaign can steal tokens from Google accounts

More than one million Google accounts have been compromised by a new authentication-theiving malware campaign called Gooligan, according to security company Check Point.

In a blog post, Check Point said the malware steals authentication tokens from infected Android devices, which can later be used to access Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive and other data stored with Google.

The Gooligan malware campaign appears to affect 74% of in-market devices, particularly those running on Android 4 (JellyBean, KitKat) and 5 (Lollipop).

Around 57% of these devices are in Asia and 9% are in Europe. Android users can check whether their account is compromised here.

Advertisement - Article continues below
Advertisement - Article continues below

Check Point suggested that, if an account has been breached, users should carry out a clean installation ("flashing") of the operating system on the affected mobile device. As this is a complicated process, however, the company said users may want to power off the device and ask their mobile service provider or a certified technician to 're-flash' the device.

Check Point also recommended changing all Google account passwords once the "flashing" process is complete.

The security company is working closely with Google to investigate the source of this campaign.

Adrian Ludwig, Google's director of Android security, said: "We're appreciative of both Check Point's research and their partnership as we've worked together to understand these issues. As part of our ongoing efforts to protect users from the Ghost Push family of malware, we've taken numerous steps to protect our users and improve the security of the Android ecosystem overall."

To counteract the malware campaign, Google is reportedly notifying affected accounts, revoking affected tokens and deploying SafetyNet improvements.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now


email delivery

How to recover deleted emails in Gmail

20 Jun 2019

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019

Best smartphone 2019: Apple, Samsung and OnePlus duke it out

24 Dec 2019

Best free malware removal tools 2019

23 Dec 2019

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
General Data Protection Regulation (GDPR)

Data protection fines hit £100m during first 18 months of GDPR

20 Jan 2020