The malware was discovered by security firm Check Point Software. The company is already working with Google together to prevent the spread of the malware and the victims to notify.
Gooligan is incorporated in a number of apps outside the Play Store to be offered. It is mainly to apps that normally cost money.
The malware has root access to Android devices and can, as in the data of users on Gmail, Google Photos, Google Docs, Google Play, Google Drive and G Suite. Still, it would be Gooligan to be used primarily to apps from Google Play to download and that in the name of the unwitting victim a positive review to give. Developers to pay for such reviews.
delete Device
The malware focuses on devices with Android 4 (Jelly Bean, kit kat) and Android 5 (Lollipop). More than 73 percent of the active Android devices run on those versions, 9 per cent of them reside in Europe.
Gooligan infected, according to security researchers daily 13.000 Android devices, via in each case, 86 infected apps. Users with infected devices would be in addition to unwanted apps pop-up ads.
Google has apps that are associated with the malware from the Play Store removed. Also disrupts the company to the servers of the creators of the malware.
Check Point Software has created a page where users can check whether their device is infected. If yes, then recommends the company to a clean installation of Android to do or to refrain from doing, then the Google account password to change.
No comments:
Post a Comment