Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.

Gooligan is able to steal the authentication tokens that are required to access data contained in many of Google’s popular offerings, including Drive, Docs, Gmail, and the G Suite.

However, it would seem that, instead of extracting personally identifiable information, the culprits have elected to install malicious Google Play apps to generate fraudulent ad revenue. Reports have said that this modus operandi nets the attackers about $320,000 every month, and that Gooligan may be the biggest recorded breach of Android devices, ever.

This makes it all the more fortunate that Gooligan has, as of yet, shown no signs of stealing any of the data it could potentially have accessed. Google has even gone on record in their belief that, “The motivation… is to promote apps, not steal information.”

While Google has since removed the apps that include Gooligan from the Play Store, there could potentially be countless more similar threats, lurking in wait of their next victim. This means that, should your employees be able to access the Play Store on their work devices, your business could be a potential victim.

Therefore, every member of a business should be informed of the seriousness of clicking around mindlessly when using a business device. Institute a policy of only allowing business-related apps on company devices, and require any BYOD devices to be thoroughly vetted by IT.

Do you have a plan to prevent unauthorized applications from appearing on company devices? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Communication Cybersecurity Saving Money Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones Data Recovery VoIP Mobile Devices Disaster Recovery communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Facebook Automation Miscellaneous Artificial Intelligence Training Covid-19 Gadgets Cloud Computing Holiday Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Virtualization Bandwidth Wi-Fi Blockchain Windows 10 Two-factor Authentication Vendor Apps Data Security Mobile Office Gmail Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking Managed Services Voice over Internet Protocol App BYOD Mobile Device Management HIPAA Access Control WiFi Office 365 Applications Conferencing How To Hacker BDR Avoiding Downtime Marketing Computing Information Technology Health Router Office Tips Analytics Big Data Augmented Reality Retail 2FA Storage Password Help Desk Bring Your Own Device Managed IT Services Computers Healthcare Website Operating System Virtual Private Network Risk Management Printer Solutions Paperless Office Infrastructure The Internet of Things Document Management Social Windows 11 Monitoring Scam Excel Data loss Customer Service Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Free Resource Cybercrime Project Management Windows 7 Physical Security Firewall Microsoft 365 Display Computer Repair Safety Virtual Desktop Data storage LiFi Employees Integration Outlook User Tip Machine Learning Modem Mobile Security Money Processor Humor Holidays Data Storage Maintenance Antivirus Customer Relationship Management Sports Smart Technology Supply Chain Mouse Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Administration Hacking Presentation Managed IT Service Wireless Technology Downloads Robot iPhone Licensing Settings Printing Entertainment Wireless Vulnerabilities Content Filtering Data Privacy IT Management Word VPN Images 101 YouTube Meetings Cryptocurrency Telephone System Multi-Factor Authentication Mobility Cost Management Content Remote Working Experience Entrepreneur Wearable Technology Memory Vendors Google Docs Unified Communications Bitcoin Network Management Health IT Running Cable Tech Support Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Google Wallet Directions Videos Assessment Electronic Health Records Monitors Wasting Time Threats Undo Windows 8 Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Drones Microchip Internet Exlporer Software as a Service Username Electronic Medical Records Managing Costs Amazon SharePoint Halloween eCommerce Black Friday SSID Virtual Assistant Outsource IT Lenovo Application Database Surveillance Writing Virtual Reality IT Technicians Virtual Machine Environment Media Hacks Server Management IBM Proxy Server Reviews Scary Stories Private Cloud Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Superfish Identity Theft Tactics Development Fun Twitter Mirgation Hypervisor Displays Deep Learning Shopping Error Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Education Addiction Social Engineering Management PCI DSS Remote Computing Chatbots Navigation Competition Mobile Computing Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Tablet Service Level Agreement Internet Service Provider Search Regulations Compliance Alert Identity Evernote Paperless Best Practice Managed IT Bookmark Buisness File Sharing User Smart Tech Memes Dark Data Co-managed IT Alerts SQL Server Technology Care Legal IT solutions Download Net Neutrality How To Business Growth Financial Data Notifications History Business Communications IP Address Browsers Smartwatch Travel Connectivity IT Break Fix Scams Cortana Azure Hybrid Work Techology Google Maps Upload Procurement Alt Codes Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Downtime Unified Threat Management Recovery IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Hard Drives Trends Supply Chain Management Typing Domains Customer Resource management FinTech Regulations Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment Network Congestion Microsoft Excel IT Maintenance Gamification Flexibility Knowledge Staff Value Business Intelligence Google Drive User Error Refrigeration Public Speaking Organization Social Networking Legislation Shortcuts Ransmoware Lithium-ion battery Fileless Malware Digital Security Cameras Point of Sale Smart Devices 5G

Blog Archive