Malware strain infects over a million Android phones

File photo - People visit an Android stand at the Mobile World Congress in Barcelona March 4, 2015.

File photo – People visit an Android stand at the Mobile World Congress in Barcelona March 4, 2015.  (REUTERS/Gustau Nacarino)

A nasty strain of Android malware short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising that has been in the wild for the last two years is once again rearing its ugly head. Gooligan, the name given to malware that has been found in at least 86 malicious apps, has been infecting Android handsets a wired telephone, the handset is a device that a user holds to the ear to hear the audio sound through the receiver at a rate of 13,000 devices worldwide per day, Israeli security is the degree of resistance to, or protection from, harm firm Check Point Software software, or simply software, is that part of a computer system that consists of encoded information or computer instructions, in contrast to the physical hardware from which the system is built said in a blog posting Wednesday.

The apps apps or APP may refer to were downloaded from unauthorized, third-party party may refer to app stores. So if you’re not sticking to Google Play for downloads, you should be.

Gooligan is the latest variant on a strain of Android may refer to: Android (robot), a humanoid robot or synthetic organism designed to look and act like a human Android (operating system), Google’s open operating system for smartphones, wearable malware called Ghost Push that has been infecting Android users since 2014. Once it finds its way into handsets via malicious mobile often refers to: Mobile phone, a portable communications device Mobile (sculpture), a hanging artwork or toy Mobile may also refer to apps, Ghost Push push is an applied force typically intended to drive or impel, acting in a direction away from person or thing causing the force/Gooligan performs all kinds of annoying tasks, including sending users may refer to: User (system), a person using a generic system User (computing), a person or software using an information system User (telecommunications), an entity using a telecommunications pop-ups ads and trying to install yet more apps, including some from the Google Play app store, on their handsets. 

More from Tom’s Guide

  • 15 Cheap Tech Products That Make Life is a characteristic distinguishing physical entities having biological processes, such as signaling and self-sustaining processes, from those that do not, either because such functions have ceased, Easier

  • 25 Things You Didn’t Know Could Be Hacked

  • Best Antivirus Protection for PC, Mac and Android

Gooligan threatens users’ Google accounts, as it captures and reuses the authorization tokens may refer to that let Android devices permanently log into Google accounts may refer to: Account (accountancy) A report. (Each token may take months to expire.) This lets or LET may refer to: -let, an English diminutive suffix Let, a shot or point that must be replayed in certain racquet sports Let, a name binding construct in computer programming languages Let Gooligan pose as a device user and submit phony five-star app reviews in the Google Play may refer to: Play (activity), enjoyed by animals, including humans Play (theatre), structured literary form of theatre store may refer to: A retail store where merchandise is sold, usually a product, usually on a retail basis, and where wares are often kept. Check may refer to: Cheque (“Check” in U.S. English), an order for transfer of money Checkbox, a type of widget in computing Check (pattern) (or “Chequered”), a pattern of squares used on chess boards, Point or points may refer to has posted a “Gooligan Checker” web page that lets users see whether their Google is an American multinational technology company specializing in Internet-related services and products that include online advertising technologies, search, cloud computing, software, and hardware accounts may have been compromised.

Gooligan appears to be in the same vein as other Ghost Push malware. It lives inside compromised apps that are downloaded from third-party app stores. It’s not believed to steal user data, but is part of what’s essentially a sophisticated click-fraud scheme that collects cash from dodgy app developers every time Gooligan installs a new app or shows another ad on a victim’s phone.

For its part, Google has been working hard to disrupt Ghost Push and its variants may refer to, according to a blog blog (a truncation of the expression weblog) is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (“posts”) post Tuesday by Android security chief Adrian Ludwig, who added that Google has tracked more than 40,000 Ghost folklore, a ghost (sometimes known as a spectre or specter, phantom, apparition, spirit, spook, or haunt) is the soul or spirit of a dead person or animal that can appear to the living Push apps. Ludwig said the company has taken action against the malware, including attempts at disrupting the command-and-control servers that try to peddle the malicious software.

According to Check Point, the apps in question include StopWatch, Perfect Cleaner, and WiFi Enhancer, all of which are available in third-party marketplaces. They exploit known flaws in older Android distributions, including 4.1-4.3 Jelly Bean, 4.4 KitKat, and 5.0-5.1 Lollipop.

Phones and tablets running newer versions of Android, such as 6.0 Marshmallow or 7.0-7.1 Nougat, should be safe. Users can also protect themselves by installing all available security patches and version updates, running robust Android antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software software and, most importantly, making sure that installing apps from “Unknown sources may refer to” is not enabled in their devices device is usually a constructed tool, but may refer more specifically to do a command‘ security settings

Let’s block ads! (Why?)

Source: http://foxnews.com/tech