Categories: spyware

200 Million Installed Keyboard App “GO Keyboard” Spying & Stealing Data Via Remote Server

One of The Most Famous Android keyboard Application “GO Keyboard” Secretly Spying the User Input Activities and collecting a large amount of data that will Send to Remote Server.

Go Keyboard is very Popular App in Google play store that offers Custom Keyboard with various colorful and attractive themes.

200 Million Users around the World has been Downloaded this GO KeyBoard Applications which is Actually Developed by the Chinese GOMO Dev Team.

Just think about that if someone who will Secretly Record all your Typing Information including the Bank account credentials, Mail passwords, Personal  Chats and send all these information into 3rd Party and sometimes it may be sold.

This Malicious Activity Performing By Some Prohibited Technique that used to Download Very Dangerous Code.

This Malicious activity Discovered by AdGuard Researchers and it was Detected by Analysing the app’s web traffic following its installation.

Also Read  Around 7 Countries ISP Maybe Supporting Hackers in the Distribution of FinFisher Spyware

How Does Go keyboard Spying You

Ad Blocker AdGuard For Android App that Inspecting the Apps Traffic that helps to Filter the traffic log shows you what exact web requests do your apps send.

This Inspection Function Tested Against the GO keyboard and that Detected the Unwanted Malicious Activities revealed that a large amount of data from the device right after installation and sending it to a remote server.

According to Adguard, Apps that steal a user’s authentication information (such as usernames or passwords) or that mimic other apps or websites to trick users into disclosing personal or authentication information.

Along with this Go KeyBoard Secretly Sending Much Personal Information such as Google account email in addition to language, IMSI, location, network type, screen size, Android version and build, device model, etc.

Once App gets installed in Users Mobile App Download an Executable code from Remote Server.

But App Policy Climbed “We will never collect your personal info including credit card information. In fact, we care about the privacy of what you type and who you type!”

It communicates with dozens of third-party trackers and ad networks. It also downloads over 14 MB of data and sends quite a lot of information about you right after the installation. It has access to sensitive data including your identity, phone calls log, contacts, microphone.

Some Research Says,10 out of 7 Apps Share your Personal Information into 3rd Party and these Application developers Extremely Crossed the line and completely Violate the  Google Policy.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free” and…

2 hours ago

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity…

3 hours ago

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging fake…

3 hours ago

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations…

3 hours ago

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two malware…

3 hours ago

Microsoft Defender Leverages Machine Learning to Block Malicious Command Executions

The modern cybersecurity landscape is witnessing an unprecedented surge in sophisticated attack techniques, with adversaries…

3 hours ago