Monday, March 17, 2025
Homespyware200 Million Installed Keyboard App "GO Keyboard" Spying & Stealing Data Via...

200 Million Installed Keyboard App “GO Keyboard” Spying & Stealing Data Via Remote Server

Published on

SIEM as a Service

Follow Us on Google News

One of The Most Famous Android keyboard Application “GO Keyboard” Secretly Spying the User Input Activities and collecting a large amount of data that will Send to Remote Server.

Go Keyboard is very Popular App in Google play store that offers Custom Keyboard with various colorful and attractive themes.

200 Million Users around the World has been Downloaded this GO KeyBoard Applications which is Actually Developed by the Chinese GOMO Dev Team.

Just think about that if someone who will Secretly Record all your Typing Information including the Bank account credentials, Mail passwords, Personal  Chats and send all these information into 3rd Party and sometimes it may be sold.

This Malicious Activity Performing By Some Prohibited Technique that used to Download Very Dangerous Code.

This Malicious activity Discovered by AdGuard Researchers and it was Detected by Analysing the app’s web traffic following its installation.

Also Read  Around 7 Countries ISP Maybe Supporting Hackers in the Distribution of FinFisher Spyware

How Does Go keyboard Spying You

Ad Blocker AdGuard For Android App that Inspecting the Apps Traffic that helps to Filter the traffic log shows you what exact web requests do your apps send.

This Inspection Function Tested Against the GO keyboard and that Detected the Unwanted Malicious Activities revealed that a large amount of data from the device right after installation and sending it to a remote server.

According to Adguard, Apps that steal a user’s authentication information (such as usernames or passwords) or that mimic other apps or websites to trick users into disclosing personal or authentication information.

Along with this Go KeyBoard Secretly Sending Much Personal Information such as Google account email in addition to language, IMSI, location, network type, screen size, Android version and build, device model, etc.

Once App gets installed in Users Mobile App Download an Executable code from Remote Server.

But App Policy Climbed “We will never collect your personal info including credit card information. In fact, we care about the privacy of what you type and who you type!”

It communicates with dozens of third-party trackers and ad networks. It also downloads over 14 MB of data and sends quite a lot of information about you right after the installation. It has access to sensitive data including your identity, phone calls log, contacts, microphone.

Some Research Says,10 out of 7 Apps Share your Personal Information into 3rd Party and these Application developers Extremely Crossed the line and completely Violate the  Google Policy.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache...

Apple Introduces RCS End-to-End Encryption for iPhone Messages

Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS)...

Adobe Acrobat Vulnerabilities Enable Remote Code Execution

A recent disclosure by Cisco Talos' Vulnerability Discovery & Research team highlighted several vulnerability...

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users

Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing...

Paragon Spyware Allegedly Ends Spyware Contract with Italy

Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy.The...

WhatsApp Wins NSO in Pegasus Spyware Hacking Lawsuit After 5 Years

After a prolonged legal battle stretching over five years, WhatsApp has triumphed over NSO...