In a blog post, Check Point said the malware steals authentication tokens from infected Android devices, which can later be used to access Google services such as Play, Gmail, Photos, Google Drive and more.
The Gooligan malware campaign appears to affect 74% of in-market devices, particularly those running Android 4 (JellyBean, KitKat) and 5 (Lollipop). Around 57% of these devices are in Asia and 9% are in Europe.
Android users can check whether their account is compromised at gooligan.checkpoint.com. If your account has been breached, you should carry out a clean installation of the operating system on the affected mobile device.
If the phone or tablet you're using already runs Android 6 (Marshmallow) or you've got a shiny, new Pixel running Nougat, you're safe even if you do allow app installs from unknown sources.
Credits To: cnet.com, heavy.com, checkpoint.com, arstechnica.com, forbes.com
MZTech is the founder and owner of MZTechBlog.Com. He works as a Programmer, has the skills in the field of web programming and networking.