Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.

Gooligan is able to steal the authentication tokens that are required to access data contained in many of Google’s popular offerings, including Drive, Docs, Gmail, and the G Suite.

However, it would seem that, instead of extracting personally identifiable information, the culprits have elected to install malicious Google Play apps to generate fraudulent ad revenue. Reports have said that this modus operandi nets the attackers about $320,000 every month, and that Gooligan may be the biggest recorded breach of Android devices, ever.

This makes it all the more fortunate that Gooligan has, as of yet, shown no signs of stealing any of the data it could potentially have accessed. Google has even gone on record in their belief that, “The motivation… is to promote apps, not steal information.”

While Google has since removed the apps that include Gooligan from the Play Store, there could potentially be countless more similar threats, lurking in wait of their next victim. This means that, should your employees be able to access the Play Store on their work devices, your business could be a potential victim.

Therefore, every member of a business should be informed of the seriousness of clicking around mindlessly when using a business device. Institute a policy of only allowing business-related apps on company devices, and require any BYOD devices to be thoroughly vetted by IT.

Do you have a plan to prevent unauthorized applications from appearing on company devices? Let us know in the comments!


No comments yet
Already Registered? Login Here
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Windows 10 Computer Managed Service Provider Data Backup Productivity Ransomware Backup Innovation Mobile Devices Business Continuity Outsourced IT Android Hardware Smartphone Google Disaster Recovery Managed IT services Upgrade Social Media Efficiency User Tips Data Recovery Browser Communication IT Support Workplace Tips Data Small Business Cloud Computing IT Support Managed IT Services Business Management Smartphones App Data Management Phishing Holiday Microsoft Office Server Office Remote Monitoring Internet of Things Miscellaneous Facebook WiFi communications Network Paperless Office Office 365 Password Windows Apps Passwords Encryption Cybersecurity Save Money Artificial Intelligence VoIP Tech Term Gmail Big Data Spam Windows 10 Unified Threat Management Document Management Hosted Solution Recovery Apple Robot Employer-Employee Relationship Risk Management Saving Money Collaboration Bandwidth Firewall Customer Relationship Management Content Filtering Chrome Tip of the week Downtime Wi-Fi Avoiding Downtime Office Tips How To Government Customer Service Mobile Device Management Money Analytics Operating System Work/Life Balance Remote Computing Word Hacker Compliance Managed IT Infrastructure Vendor Management Going Green Telephone Systems Alert Applications Printing Data storage Social Windows 7 Health Computing Website Vulnerability Hacking Help Desk Mobile Computing Virtual Reality Data Security Training Tech Support Two-factor Authentication SaaS Settings BYOD IT Management The Internet of Things Computers Mobile Device Antivirus Business Growth Redundancy Presentation Healthcare Project Management Data loss File Sharing BDR Managed Service Education Business Technology Outlook Cybercrime Automation Physical Security Net Neutrality Taxes Proactive IT solutions Smart Technology Safety Retail Botnet Wireless Technology Remote Monitoring and Management Best Practice Samsung HIPAA Software as a Service Patch Management Wireless Lithium-ion battery Solid State Drive Router Mobile Security Scam Business Owner Meetings Identity Theft Storage Marketing Computer Care YouTube Unified Communications VPN Assessment Server Management Competition Licensing LiFi Virtual Private Network Digital Payment Access Control Consultation Information Technology Upgrades Maintenance Automobile Budget Humor End of Support Augmented Reality Laptops Analyitcs Mouse IBM Running Cable Tablet Legal Display Bring Your Own Device Search Specifications Twitter Sports IT service Politics Regulations Monitors Cortana Travel Google Drive Virtualization Administration User Websites Recycling Batteries Typing Lenovo Digital Motion Sickness Tracking Wearable Technology Bookmarks Google Docs Unified Threat Management Buisness Shortcut iPhone Uninterrupted Power Supply Motherboard Voice over Internet Protocol Writing Management Remote Work Personal Information Cryptocurrency Internet Exlporer Superfish Knowledge Spyware IT Consultant Favorites business communications systems Distributed Denial of Service Machine Learning Social Engineering Enterprise Resource Planning File Management Computer Repair Bitcoin Experience data services How To Cleaning WPA3 Notifications IT Technicians Conferencing Internet Protocol Technology Tips Heating/Cooling Managed IT Service Hard Disk Drive Relocation Modem Manufacturing Mobile Telephone Electronic Medical Records Windows 8 Hotspot Google Wallet Networking User Error Firefox Webcam Supercomputer Servers Domains Fleet Tracking PowerPoint Crowdsourcing Mirgation Employees Dark Data VoIP streamlines Comparison Break Fix 5G Entrepreneur Private Cloud Cookies Gadgets IT Budget Company Culture Mobile VoIP Language Drones Printer Application Consumers Point of Sale Public Speaking Asset Tracking Migration Zero-Day Threat business network infrastructure Users Black Friday Dark Web Error Nanotechnology Proactive Maintenance Vulnerabilities Computing Infrastructure Techology Statistics eWaste Software Tips Remote Workers Chatbots Backup and Disaster Recovery Cyber Monday Data Warehousing Mail Merge IoT Processor IT Sevices Web Server Geography Update Alerts Disaster Resistance Laptop SharePoint Hard Drives Bluetooth Environment Information Identity RMM Virtual Desktop flu season 3D Printing Microsoft Excel Address Corporate Profile Administrator Utility Computing Cameras Cables Chromebook Cooperation Proactive IT Halloween Downloads Quick Tips Refrigeration Troubleshooting History Monitoring Law Enforcement Procurement Network Congestion Fort Worth Active Directory Unsupported Software Deep Learning Blockchain Fun WannaCry CCTV Wires Emoji Staff IT Consulting Scary Stories Multi-Factor Security Time Management Mobility Cabling Electronic Health Records Phone System Gadget Remote Worker flu shot Cost Management Windows Server Mobile Data Permissions Hacks Staffing Flexibility Data Breach Google Calendar Network Management Undo Fort Worth IT IP Address Professional Services Hard Drive User Management Alt Codes Fraud Current Events VoIP GPS G Suite Google Maps MSP Processors Operations Cyberattacks Technology Laws Legislation Touchscreen DFW IT Service Mobile Office Disaster Social Networking Virtual Assistant

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...