The government has issued a warning about the infiltration of Android Malware Goldoson in the Google Play Store. This article provides essential information on the malware, its impact, and preventive measures to ensure the safety of your device. Read on to learn how to identify and remove infected apps and adopt best practices for secure app downloads.
Android Malware Goldoson Infects Google Play Apps
The government advisory has revealed that Android Malware Goldoson has gained access to the Google Play Store through legitimate apps, impacting approximately 60 applications. The malware is embedded within a third-party library used by app developers. Goldoson is a dangerous malware capable of collecting various types of sensitive data from your mobile device, including app details, connected devices, and GPS location.
Effects of Goldoson Malware
Apart from data collection, Goldoson can engage in advertisement fraud by automatically clicking ads without the user’s consent. This malicious activity can lead to financial losses and privacy breaches. It’s crucial to remain cautious and take immediate action to protect your device from this malware.
Infected Apps to Watch Out For
The following popular apps have been identified as carriers of the Goldoson malware:
- Swipe Brick Breaker
- Bounce Brick Breaker
- Korea subway Info: Metroid
- GOM Player
- GOM Audio-Music, Sync lyrics
- Pikicast
- Live Score, Real-Time Score
- Compass 9: Smart Compass
- Lotte World Magicpass
- Infinite Slice
- SomNote
- L.Point with L.Pay
- Money Manager Expense & Budget
How to Protect Your Device
While Google Play has blacklisted the aforementioned apps, it is essential for users to manually check and remove these apps if they were previously installed. Take the following precautions to safeguard your device:
- Download from Trusted Sources: Exercise caution even when downloading apps from trusted sources. Malware can often slip through security measures unnoticed.
- Limit App Permissions: When installing new apps, carefully review and limit the permissions they request. Grant access only to necessary features.
- Verify Developer Legitimacy: Research the developers and their track record before installing any app. Stick to well-known and reputable developers.
- Check App Reviews: Read user reviews and ratings to gauge the app’s credibility. Look for any red flags or suspicious activities reported by users.