However because the #malware, dubbed Googlian, is delivered via apps downloaded from non-approved, third-party app sites, it only affects an estimated 1,000 users in the United States.
“The Gooligan campaign most heavily affects Android users in Asia. That’s likely because users there rely more on third-party app stores. In the United States, Android users stick to Google Play for apps,” said Check Point spokeswoman
The malware campaign, named Googlian, attacks phones running the Android 4 and 5 operating systems, known as Jelly Bean, KitKat and Lollipop, and according to Check Point Software Technologies can potentially access information from users’ other Google accounts.
However, Google said in a blog post that it had found no evidence of other fraudulent activity within affected Google accounts.
The software is part of “GhostPush,” a family of apps that once installed, try to download other apps. Google said that it has been tracking this family of malware since 2014 and so far has detected and prevented the installation of over 150,000 variations of Ghost Push.
The problem almost only affects Android phone users who have downloaded apps from a non-approved Android site. Those who buy their apps on the Google Play store are generally safe, Check Point said.
Google said it has contacted affected users, removed apps associated with the problem and added new protections to its Verify Apps technology.
The problem is similar to an issue that surfaced with malware that could affect iPhones running non-Apple approved apps in 2015.
The moral of the story is that consumers should stick with legitimate sources for their apps, said Dimitri Sirota, CEO of BigID, a data protection company.
“The best policy for avoiding this type of unfortunate situation is to look at the reputation of the purveyor — buy your Gucci from a Gucci store, get your news from a publication with a reputation at stake and download your apps from certified stores like Google Play,” he said.
Google also reminded users of Android phones to keep their devices up to date and thus secure.
Because Ghost Push only uses publicly known vulnerabilities, devices with up-to-date security patches have not been affected,” its blog post said.
Read or Share this story: http://usat.ly/2glzSiU
EDITOR NOTES: Please share and comment on this with consideration for others please …