{
	"id": "c11dced4-4fe6-4be1-b32d-4511d8dab431",
	"created_at": "2026-04-06T00:17:26.991424Z",
	"updated_at": "2026-04-10T03:30:33.56097Z",
	"deleted_at": null,
	"sha1_hash": "717031019fad05a8ec8e4b46b0c3645f89ba67db",
	"title": "Ghost Push and Gooligan: One and the Same",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30787,
	"plain_text": "Ghost Push and Gooligan: One and the Same\r\nBy Lookout\r\nPublished: 2016-12-01 · Archived: 2026-04-02 11:19:23 UTC\r\nYou may have seen headlines about a new family of malware called \"Gooligan.\" This is not actually a net new\r\nmalware family, but rather it's a variant of the family \"Ghost Push,\" a threat first discovered in 2014. Lookout\r\ncustomers have been protected against this threat since then.Google released a blog post on the threat called, \"The\r\nfight against Ghost Push continues.\" In it, the company reveals that is has been tracking the malware and\r\nacknowledges a problem anyone, especially enterprises, should be watching for: malware evolves and becomes\r\nmore sophisticated over time.\r\nYou’re already protected\r\nLookout already has coverage for these families and variants.\r\nWe encourage Android users to keep their devices up-to-date with the latest security patches (some instances of\r\nGooligan malware attempt to use known vulnerabilities to exploit a device), use caution when downloading apps\r\nfrom third-party stores, and ensure you’re using Lookout to stay ahead of and protected from mobile threats.\r\nWhat it does\r\nAndroid devices get infected by Ghost Push when a person installs a malicious app. Once installed, the malware\r\n“drops” or installs additional, and sometimes harmful apps on the device. Lookout detects these malware families\r\nand variants, as well as the newly-downloaded apps they drop onto the device.\r\nThis variant of the malware family is reportedly responsible for compromising one million Google accounts that\r\nmay include Gmail, Google Play, Google Drive and other account-types. While the claims are no doubt true that\r\nGoogle authorization tokens have been collected, posing a risk to Google accounts, Google has stated they have\r\nseen no evidence of user data access or fraudulent activity on the affected accounts.\r\nSource: https://blog.lookout.com/blog/2016/12/01/ghost-push-gooligan/\r\nhttps://blog.lookout.com/blog/2016/12/01/ghost-push-gooligan/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://blog.lookout.com/blog/2016/12/01/ghost-push-gooligan/"
	],
	"report_names": [
		"ghost-push-gooligan"
	],
	"threat_actors": [
		{
			"id": "75108fc1-7f6a-450e-b024-10284f3f62bb",
			"created_at": "2024-11-01T02:00:52.756877Z",
			"updated_at": "2026-04-10T02:00:05.273746Z",
			"deleted_at": null,
			"main_name": "Play",
			"aliases": null,
			"source_name": "MITRE:Play",
			"tools": [
				"Nltest",
				"AdFind",
				"PsExec",
				"Wevtutil",
				"Cobalt Strike",
				"Playcrypt",
				"Mimikatz"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434646,
	"ts_updated_at": 1775791833,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/717031019fad05a8ec8e4b46b0c3645f89ba67db.pdf",
		"text": "https://archive.orkl.eu/717031019fad05a8ec8e4b46b0c3645f89ba67db.txt",
		"img": "https://archive.orkl.eu/717031019fad05a8ec8e4b46b0c3645f89ba67db.jpg"
	}
}