OpenLink Software

Usage stats on Gooligan

 Permalink

an Entity in Data Space: dbkwik.org

The infection begins when a user installs a Gooligan-infected app on a vulnerable Android device. Gooligan then downloads a rootkit from the C&C server that takes advantage of multiple Android 4 and 5 exploits including the well-known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153). * Steal a user’s Google email account and authentication token information * Install apps from Google Play and rate them to raise their reputation * Install adware to generate revenue

Graph IRICount
http://dbkwik.webdatacommons.org21
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software