Up
Logo
  • Menu
Logo Cancel
  • +1 212 694 7000 New York
  • +44 207 016 4250 London
  • +34 917 021 364 Madrid
  • +41 799 020 921 Geneva
  • +1 213 296 3300 Los Angeles
  • Home
  • Insights
  • Thought Leadership
  • Alert: Malware Is Attacking Google Accounts on Android Phones

30 Nov 2016

Alert: Malware Is Attacking Google Accounts on Android Phones

Malware Alert

NOTE: This malware applies only to Android phones. If you have an iPhone, your device is not affected by this malware.

A massive fraud campaign is exploiting Google accounts on Android devices. More than 1 million accounts have already been compromised, and an additional 13,000 accounts are infected each day.

Malicious software is installed on Android devices through a phishing email or through apps purchased from third-party app stores. The malware might do the following:

  • Collect data about your device
  • Access your Google account, including Google Play, Gmail, Google Photos, Google Drive, and G Suite
  • Install fraudulent apps from Google Play and rate them positively
  • Download adware to generate revenue

Once installed, the malware takes over the device and installs apps to make money for a fraudulent advertising scam. Stolen Google usernames and passwords are used to post fake positive reviews about the apps, which increases their ratings in Google Play. Each time a fraudulent app is installed or an advertisement is clicked, the criminals behind the scheme make money.

The malware has been successful stealing usernames and passwords because it is able to bypass current Google security measures, including two-factor authentication. To determine if your Google account has been compromised, visit this site set up by Google and its security partner. Type the Gmail address associated with your Android. A pop-up will state whether your account was breached.

If your account has been breached, change your Gmail password immediately, as well as similar passwords in other accounts. It appears that the only recourse for deleting the malware is a clean installation of the operating system (“flashing”). It is recommended that you have a certified technician or your service provider “re-flash” your device.

Whether you use an Android or an iPhone, do not install apps from an email or from third-party app stores. Do research and read reviews before downloading any app to keep yourself, your company, and your friends and family secure.

Our Cyber Defense practice stands ready to help you stay protected, prepared, and ahead of the threat.

Banking Pot: How Financial Institutions Can Prepare for Changing Regulations

04 Feb 2019

04 Feb 2019

The Unexplained Wealth Order Imperative: Always Keep Your Financial House in Order

25 Jan 2019

25 Jan 2019

The Importance of Enterprise-Wide Risk Assessments for Financial Institutions

24 Jan 2019

24 Jan 2019

A Winning Anti-Money Laundering Strategy: Strengthen Your Defense Against Financial Crimes

14 Jan 2019

14 Jan 2019

  • Services
    • Our Practices
      • Investigations and Disputes
      • Regulatory Compliance
      • Cyber Defense
      • Construction and Real Estate
      • Strategic Risk and Security
      • Private Client Services
    • Our Approach
      • Multidisciplinary Teams
      • Investigative Experience
      • Global Reach
      • Technology
    • The K2 Difference
  • People
    • Professionals
    • Spotlight Profiles
  • Insights
    • Focus On
    • Thought Leadership
    • Video
    • Resources
      • Glossary
      • Links
malwarephishingprotectcyber risk exposurecyber threat
  • About Us
  • Our Offices
  • Find a Professional
  • Sitemap
© 2018 K2 Intelligence, LLC | Privacy Notice | K2 Intelligence is not affiliated with Kroll Inc., Kroll Associates, Inc., Kroll On Track, Inc. or their affiliated businesses.
loader
  • Services
    • Our Practices
      • Investigations and Disputes
      • Regulatory Compliance
      • Cyber Defense
      • Construction and Real Estate
      • Strategic Risk and Security
      • Private Client Services
    • Our Approach
      • Multidisciplinary Teams
      • Investigative Experience
      • Global Reach
      • Technology
    • The K2 Difference
      • A History of Success
      • Sizing Up a Situation
      • Finding the Needle in the Haystack
      • A Multidisciplinary Approach
      • Considering Every Angle
      • Securing the Right Outcome
  • People
    • Professionals
    • Spotlight Profiles
  • Insights
    • Focus On
      • Africa and Middle East
      • Art Risk Advisory: Art, Collectibles, and Wine
      • Corporate Social Responsibility
      • Cybersecurity Awareness
    • Thought Leadership
    • Video
    • Resources
      • Glossary
      • Links
  • About Us
    • Our Story
    • Our Offices
    • Corporate Social Responsibility
    • Contact Us
    Careers
    • Working at K2 Intelligence
    • Job Opportunities
    Media
    • Appearances
    • Newsroom
    • Mentions
    • Media Contacts
    Events
    • Webinars
    • Speaking Engagements
    • Roundtables
  • Contact Us