ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

Gooligan can steal the authentication tokens that are used to access information stored by Google’s most common offerings. Among these are Google Drive, Google Docs, Gmail, and the G-Suite.

Rather than using the vulnerability to steal data, the criminals seem content with just using the devices to install malicious apps from the Google Play store to generate ad revenue. In fact, according to reports, this primary reason to use Gooligan brings in about $320,000 every month for the fraudsters, which makes Gooligan perhaps the largest Android breach in its history.

Of course, we bet that you’re breathing in a sigh of relief, thanking your lucky stars that Gooligan hasn’t shown any signs of stealing data. When you think about it, this is pretty incredible, as Gooligan could potentially be accessing sensitive information that is stored anywhere on your Android device. Even Google believes that Gooligan is focused more on accruing revenue rather than stealing data, claiming “The motivation… is to promote apps, not steal information.”

Google has taken the initiative and removed apps that include Gooligan from the Play Store, but who knows what other threats are out there, just waiting to be installed on a device? Keeping these threats in mind is key, especially when you have employees using their own mobile devices to access company data. If your employees access the Play Store on their devices, you need to educate them on the effects of Gooligan and how to avoid becoming a victim.

This is why it’s so important that your organization is ready to handle employee devices by following a strong Bring Your Own Device policy. If you don’t already have a BYOD policy in place, be sure to implement one as soon as possible--one that requires any employees using their own devices for work purposes to go through IT and ensure that security protocol is followed closely.

If you don’t already have a plan to deal with unauthorized devices on your network, or unauthorized apps appearing on your devices, be sure to reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips VoIP Social Media Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Passwords Holiday Covid-19 Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Managed Service Provider Internet of Things Government Saving Money Operating System Workplace Strategy Gadgets Networking Windows Artificial Intelligence Managed IT services Bandwidth Remote Encryption Mobile Device Management Business Technology App Virtualization Blockchain Spam Server WiFi Information Budget Employee/Employer Relationship Gmail History Office Apple Two-factor Authentication Information Technology Office 365 Cybercrime Wi-Fi BDR Big Data Health Analytics Conferencing Access Control Data Security Vendor Compliance Remote Monitoring Help Desk Employer-Employee Relationship Hacking Cost Management IT Management Voice over Internet Protocol Training Document Management Remote Computing Hacker Save Money Patch Management Applications Augmented Reality Word Project Management BYOD Vulnerabilities IBM Website Computing Search... Best Practice Vendor Management Hard Drive Retail Mobile Office Alert Data loss Managed Services Legal Hiring/Firing Outlook Password Data storage Money Customer Service Unified Threat Management Firewall Antivirus Black Market iPhone Cleaning Mobile Computing Maintenance Cortana Education Robot Content Filtering Marketing Monitoring Running Cable Healthcare Windows 11 Websites Router Storage Meetings Mobility The Internet of Things Remote Workers YouTube Twitter Google Maps Scam Windows 7 Free Resource Law Enforcement Laptop End of Support Printer User VPN How To Update Chrome Social Sports Travel DDoS Virtual Reality Data Breach SaaS Social Engineering Cryptocurrency Paperless Office Avoiding Downtime Administration Disaster Physical Security Holidays Presentation Specifications Politics IT Consultant Lithium-ion battery Machine Learning Settings Cooperation Multi-factor Authentication Video Conferencing Start Menu Customer Relationship Management Computer Care Co-Managed IT Solid State Drive Downloads Virtual Machines Processors Entertainment Computer Repair Vulnerability Saving Time Professional Services Chromebook Software as a Service Drones Data Protection Computers Bitcoin Automobile Telephone Managed Services Provider How To Virtual Private Network Wireless Technology Microchip Flexibility HIPAA eWaste Excel Current Events Downtime Tech Terms Safety Identity Theft Solutions Hack Notifications Managed IT Unified Communications Virtual Assistant Digital Integration Images 101 Virtual Desktop Experience Display Google Docs Taxes Bluetooth Distributed Denial of Service Office Tips Employees Private Cloud Processor Memory PowerPoint Username File Sharing Videos Botnet Surveillance Rental Service Redundancy Managing Costs Electronic Payment Micrsooft Startup Freedom of Information email scam Navigation Flash Cache Addiction SSID Telephone Systems Unified Threat Management Employer/Employee Relationships Business Growth Workers Mobile Security Media Development Recovery User Tip Virtual Machine Competition Legislation Phone System News CCTV Reviews Printing Evernote Optimization Network Management Smart Technology Banking Touchscreen Teamwork Entrepreneur Google Wallet 2FA LiFi Data Storage Documents Messenger Emergency Proxy Server Hypervisor Application Deep Learning Emails Computer Malfunction Fake News Business Intelligence Computing Infrastructure Shopping Vendor Mangement Service Level Agreement Medical IT Business Metrics Management SQL Server Hosted Solution Samsung Device security Computer Accessories Paperless PCI DSS Securty Books Licensing Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel Society Business Cards Gig Economy Tech Humor Domains Language Business Mangement Going Green Supply Chain Error Azure Tablets Business Communications Internet Service Provider Regulations Compliance Reading Bookmark Managed IT Service Monitors Visible Light Communication Windows 8 Supercomputer Piracy Google Calendar Term Memes Download Workplace Virus HTML Human Resources Net Neutrality Financial Data Relocation Browsers Public Speaking Displays Nanotechnology Advertising Motion Sickness Troubleshooting Tech Support Software License Risk Management Streaming Media Comparison Google Play IT Work/Life Balance Google Drive Upload Scams Social Network Keyboard Google Apps Telework Knowledge Data Analysis Hard Drives Corporate Profile Screen Reader Telephony Trends Microsoft 365 Cables intranet Employer Employee Relationship Mobile Technology Smartwatch In Internet of Things Television Security Cameras Communitications Procurement Wireless Hacks Customer Resource management Shortcut Network Congestion Cabling Devices Environment G Suite Tip of the week FinTech Reliable Computing Fileless Malware Heating/Cooling Writing Tablet VoIP Gamification Point of Sale Business Owner Social Networking Tracking Company Culture CES Windows XP Mouse IT Assessment Supply Chain Management Telephone System Value Regulations Web Server Organization Scalability Directions Cyber security Backup and Disaster Recovery Shortcuts Text Messaging Content Proactive IT Digital Payment Desktop Administrator SharePoint Smart Devices Remote Working Bring Your Own Device Electronic Medical Records Worker Accountants AI Trend Micro Access Database Be Proactive Time Management Transportation Inbound Marketing Music Public Cloud Digital Security Cameras Electronic Health Records Staffing Health IT Wasting Time Equifax Hard Drive Disposal Audit eCommerce IP Address Spyware Tactics Modem Workplace Strategies

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?