More Than 2 Million Accounts Compromised By Android Malware
Security experts at Check Point recently discovered a new Android malware that compromises Google accounts of random users. This malware specifically targets Android devices that run on the Android 5 Lollipop and Android 4 KitKat versions.
New Android Malware Hacking Google User Accounts
According to Yahoo News, the major malware risk on smartphones remains to download a hostile app that runs up your phone bill or tries to compromise your data. In order to avoid such threat, the best advice is to stick to the Google Play Store. Downloading apps from the Web or third-party stores pose security risks.
The risk of malware is dramatically less on Google Play than a third-party app store because all apps on the Play Store are screened. However, the Google Play is not immune from risks. Technowize reported that researchers at Check Point, a cyber security company, discovered a new Android malware variant dubbed Googligan that affects the devices through various Google Play apps. The malware can hack Google accounts of random users.
Googligan is affecting almost 13,000 Android devices daily. Affected Google Play apps steal Google accounts' authentication details that are synced to the device. With this information, the hackers can access the user's data stored in G Suite, Google Play, Google Photos, Google Docs and Gmail.
After scanning all the affected accounts with the Android Security System, the faulty apps were already taken down from the Google Play store. According to Google officials, the malware has not affected personal files of the users.
How The Android Malware Works
The root cause of security breach is a bug present in the development platform of the malicious apps. This malware searches for HTML pages and then introduces infectious content towards the end of such HTML pages. The consequence is that Android malware could hide in the development platform without the developer's knowledge.
The HTML pages are designed to create revenue for the hackers by installing certain apps. They also fraudulently rate the apps on behalf of the user. More than 2 million apps were already installed through this process by the Android malware.
Android Apps May Be Infected With Old Windows Malware
Old Windows malware may have infected several Android applications.
Cyberespionage Group Targets Israeli Soldiers With Android Malware
Security experts warn that cyberespionage group has been targeting Israeli military with Android mobile surveillance malware.
Samsung Galaxy S8 vs Xiaomi Mi 6: Head-to-head Specs Shootout
Samsung's Galaxy S8 and Xiaomi's Mi 6 are high-end phones. Both phones boast of top-tier looks and powerful hardware.
Google Pixel XL vs Essential Phone vs Galaxy S8: Specs Comparison
Comparing the new Essential smartphone spec by spec with the big beasts of the phone market right now.
MORE IN ITECHPOST
Fitness Expert, Jolene Cherry, Explains How to Build Good Fitness Habits Using Tech
Cherry explores several different technology gizmos and gadgets to keep in mind when the initial burst of fitness motivation runs dry.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?