<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Play Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/google-play/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/google-play/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Thu, 19 Dec 2024 07:42:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>Google Play Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/google-play/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</title>
		<link>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=goldoson-an-android-malware-invade-60-applications-on-google-play</link>
					<comments>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/#respond</comments>
		
		<dc:creator><![CDATA[Namita Mahajan]]></dc:creator>
		<pubDate>Fri, 19 May 2023 08:52:45 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=84237</guid>

					<description><![CDATA[<p>Goldoson is an Android malware that invades 60 applications. These applications had 100M downloads collectively. This malware is a third-party library component that all 60 applications were using. However, the developers were not known about the malware. Here is the list of a few infected applications: McFee&#8217;s research team discovered this malware, &#8220;Goldoson.&#8221; According to...</p>
<p>The post <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/">&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Goldoson is an Android malware that invades 60 applications. These applications had 100M downloads collectively. This malware is a third-party library component that all 60 applications were using. However, the developers were not known about the malware.</p>



<p><strong>Here is the list of a few infected applications:</strong></p>



<ul class="wp-block-list">
<li>L.POINT with L.PAY &#8211; 10 million downloads</li>



<li>Pikicast &#8211; 5 million downloads</li>



<li>Swipe Brick Breaker &#8211; 10 million downloads</li>



<li>Money Manager Expense &amp; Budget &#8211; 10 million downloads</li>



<li>LIVE Score, Real-Time Score &#8211; 5 million downloads</li>



<li>GOM Player &#8211; 5 million downloads</li>



<li>Compass 9: Smart Compass &#8211; 1 million downloads</li>



<li>and more</li>
</ul>



<p>McFee&#8217;s research team discovered this malware, &#8220;Goldoson.&#8221; <a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/" target="_blank" rel="noreferrer noopener">According to them</a>, the malware collected data from different resources, including the user&#8217;s GPS location, WiFi-connected devices, Bluetooth devices, and installed apps.</p>



<p>Moreover, it could do ad fraud if a user clicks on any ad without taking consent from the user.</p>



<h2 class="wp-block-heading" id="h-android-malware-steals-data-from-devices">Android Malware <strong>Steals Data from Devices</strong></h2>



<p>If a user downloads and installs any application containing Goldoson, its library automatically logs the device and captures its configuration using a remote private server.</p>



<p>The configuration includes all the parameters Android malware can run on the device for ad clicking and data stealing.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="595" height="795" src="https://d1w4k2ccg1tr4m.cloudfront.net/wp-content/uploads/2023/05/config.webp" alt="Android Malware" class="wp-image-84239" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/config.webp 595w, https://www.trickyenough.com/wp-content/uploads/2023/05/config-225x300.webp 225w, https://www.trickyenough.com/wp-content/uploads/2023/05/config-150x200.webp 150w" sizes="(max-width: 595px) 100vw, 595px" /></figure></div>


<p>Every two days, it collects data by activating the function of data collection. Then, it sends the C2 server the list of geographical locations, installed apps, and MAC addresses of the devices connected via WiFi, Bluetooth, etc.</p>



<p>The data amount collected by the malware depended on the permissions provided by the user. For example, Devices with <a href="https://www.trickyenough.com/exploring-android-11-and-android-12-android-studio-4-0-features/" target="_blank" rel="noreferrer noopener">Android 11</a> or above provide high-level protection for data. So, they might be less affected compared to the lower versions.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="609" height="334" src="https://d1w4k2ccg1tr4m.cloudfront.net/wp-content/uploads/2023/05/json-data.jpg" alt="" class="wp-image-84240" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/json-data.jpg 609w, https://www.trickyenough.com/wp-content/uploads/2023/05/json-data-300x165.jpg 300w, https://www.trickyenough.com/wp-content/uploads/2023/05/json-data-150x82.jpg 150w" sizes="(max-width: 609px) 100vw, 609px" /></figure></div>


<p>However, McAfee also found that in recent OS versions, users gave malware enough permission to collect sensitive data of their devices in 10% of apps. Along with that, The function of ad-clicking is activated using a customized HTML code, various URL visits, WebView, and generating ad revenues.</p>



<p>Goldoson libraries are removed from the Google Play app. But, MaAfee warned the users to always check twice before allowing permissions to any application because the risk is still there.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/remove-malware-from-computer/" target="_blank" rel="noreferrer noopener">How To Remove Malware From Computer</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/">&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">84237</post-id>	</item>
	</channel>
</rss>
