The infection begins when a user installs a Gooligan-infected app on a vulnerable Android device. Gooligan then downloads a rootkit from the C&C server that takes advantage of multiple Android 4 and 5 exploits including the well-known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153). * Steal a user’s Google email account and authentication token information * Install apps from Google Play and rate them to raise their reputation * Install adware to generate revenue
Attributes | Values |
---|---|
rdf:type | |
rdfs:label |
|
rdfs:comment |
|
Length |
|
dcterms:subject | |
dbkwik:malware/pro...iPageUsesTemplate | |
Date |
|
Origin |
|
Platform |
|
Name |
|
Type |
|
Creator |
|
abstract |
|