Saturday, June 15, 2024

200 Million Installed Keyboard App “GO Keyboard” Spying & Stealing Data Via Remote Server

One of The Most Famous Android keyboard Application “GO Keyboard” Secretly Spying the User Input Activities and collecting a large amount of data that will Send to Remote Server.

Go Keyboard is very Popular App in Google play store that offers Custom Keyboard with various colorful and attractive themes.

200 Million Users around the World has been Downloaded this GO KeyBoard Applications which is Actually Developed by the Chinese GOMO Dev Team.

Just think about that if someone who will Secretly Record all your Typing Information including the Bank account credentials, Mail passwords, Personal  Chats and send all these information into 3rd Party and sometimes it may be sold.

This Malicious Activity Performing By Some Prohibited Technique that used to Download Very Dangerous Code.

This Malicious activity Discovered by AdGuard Researchers and it was Detected by Analysing the app’s web traffic following its installation.

Also Read  Around 7 Countries ISP Maybe Supporting Hackers in the Distribution of FinFisher Spyware

How Does Go keyboard Spying You

Ad Blocker AdGuard For Android App that Inspecting the Apps Traffic that helps to Filter the traffic log shows you what exact web requests do your apps send.

This Inspection Function Tested Against the GO keyboard and that Detected the Unwanted Malicious Activities revealed that a large amount of data from the device right after installation and sending it to a remote server.

According to Adguard, Apps that steal a user’s authentication information (such as usernames or passwords) or that mimic other apps or websites to trick users into disclosing personal or authentication information.

Along with this Go KeyBoard Secretly Sending Much Personal Information such as Google account email in addition to language, IMSI, location, network type, screen size, Android version and build, device model, etc.

Once App gets installed in Users Mobile App Download an Executable code from Remote Server.

But App Policy Climbed “We will never collect your personal info including credit card information. In fact, we care about the privacy of what you type and who you type!”

It communicates with dozens of third-party trackers and ad networks. It also downloads over 14 MB of data and sends quite a lot of information about you right after the installation. It has access to sensitive data including your identity, phone calls log, contacts, microphone.

Some Research Says,10 out of 7 Apps Share your Personal Information into 3rd Party and these Application developers Extremely Crossed the line and completely Violate the  Google Policy.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles