Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.

Gooligan is able to steal the authentication tokens that are required to access data contained in many of Google’s popular offerings, including Drive, Docs, Gmail, and the G Suite.

However, it would seem that, instead of extracting personally identifiable information, the culprits have elected to install malicious Google Play apps to generate fraudulent ad revenue. Reports have said that this modus operandi nets the attackers about $320,000 every month, and that Gooligan may be the biggest recorded breach of Android devices, ever.

This makes it all the more fortunate that Gooligan has, as of yet, shown no signs of stealing any of the data it could potentially have accessed. Google has even gone on record in their belief that, “The motivation… is to promote apps, not steal information.”

While Google has since removed the apps that include Gooligan from the Play Store, there could potentially be countless more similar threats, lurking in wait of their next victim. This means that, should your employees be able to access the Play Store on their work devices, your business could be a potential victim.

Therefore, every member of a business should be informed of the seriousness of clicking around mindlessly when using a business device. Institute a policy of only allowing business-related apps on company devices, and require any BYOD devices to be thoroughly vetted by IT.

Do you have a plan to prevent unauthorized applications from appearing on company devices? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Holiday Information Automation Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Mobile Office Data Security Apps Two-factor Authentication Vendor Chrome Budget Mobile Device Management Apple Networking Managed Services Gmail Voice over Internet Protocol App WiFi BYOD Employer-Employee Relationship Tip of the week Avoiding Downtime Marketing Conferencing How To BDR Computing Information Technology Access Control HIPAA Office 365 Hacker Applications Augmented Reality Website Retail Storage 2FA Help Desk Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Virtual Private Network Risk Management Health Router Computers Analytics Office Tips Document Management Windows 11 Monitoring Scam Data loss Excel Firewall Remote Workers Telephone Going Green Patch Management The Internet of Things Save Money Remote Monitoring End of Support Vulnerability Cooperation Free Resource Vendor Management Social Project Management Cybercrime Windows 7 Physical Security Display Microsoft 365 Printer Customer Service Solutions Paperless Office Infrastructure Mobile Security Processor Money Humor Holidays Data Storage Maintenance Word Antivirus Smart Technology Supply Chain Sports Video Conferencing Mouse Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Safety Downloads Robot iPhone Licensing Settings Wireless Entertainment Printing Vulnerabilities Data Privacy Content Filtering IT Management Images 101 VPN YouTube Meetings Telephone System Multi-Factor Authentication Cryptocurrency Mobility Cost Management Customer Relationship Management Computer Repair Virtual Desktop Data storage LiFi Hacking Employees Presentation Integration Outlook User Tip Modem Wireless Technology Machine Learning Virtual Assistant Outsource IT Writing Database Surveillance Lenovo IP Address IT Technicians Virtual Machine Environment Media Virtual Reality Proxy Server Reviews Cookies Hacks Server Management Cyber Monday Medical IT Scary Stories Private Cloud Hotspot Transportation Small Businesses Identity Theft Recovery Fun Tactics Development Superfish Mirgation Hypervisor Displays Deep Learning Hard Drives Twitter Shopping Nanotechnology Optimization Domains PowerPoint Error Language Employer/Employee Relationships Outsourcing Education Social Engineering Addiction Management PCI DSS Chatbots Refrigeration Navigation Remote Computing Gig Economy Screen Reader Mobile Computing Public Speaking Distributed Denial of Service Workplace Lithium-ion battery Computing Infrastructure Teamwork Hiring/Firing Tablet Search Service Level Agreement Internet Service Provider Regulations Compliance Identity Best Practice Evernote Paperless Alert Entrepreneur Dark Data Bookmark Smart Tech Memes Managed IT Co-managed IT Buisness File Sharing Alerts SQL Server Technology Care IT solutions How To Download Net Neutrality Legal Financial Data History Business Growth Undo Business Communications Notifications Browsers Smartwatch Connectivity IT Break Fix Scams Travel Azure Hybrid Work Google Maps Cortana Upload Procurement Techology Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources CES IoT Communitications Dark Web Cables Downtime Unified Threat Management Hosted Solution Application Trends Supply Chain Management Unified Threat Management Customer Resource management FinTech Regulations Typing Google Calendar Term Google Apps Network Congestion Data Analysis Star Wars IT Assessment IBM Microsoft Excel IT Maintenance Staff Value Business Intelligence Knowledge Gamification Flexibility Google Drive User Error Organization Social Networking Legislation Shortcuts 5G Fileless Malware Digital Security Cameras Smart Devices Ransmoware Point of Sale Wearable Technology Memory Vendors Unified Communications Experience Content Remote Working Google Docs Health IT Motherboard Data Breach Bitcoin Network Management Competition Comparison Google Play Be Proactive Running Cable Tech Support Monitors Directions Videos Assessment Electronic Health Records Google Wallet Permissions Workforce Wasting Time Threats Trend Micro Windows 8 Specifications Security Cameras Workplace Strategies Laptop Websites User Microchip Internet Exlporer Software as a Service Drones Fraud Meta Username SharePoint Managing Costs Amazon Electronic Medical Records eCommerce Black Friday SSID Halloween

Blog Archive