Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

The researchers at FireEye have come to the conclusion that Kemoge is found within legitimate applications that are distributed through a third-party application store. Kemoge has been found to brutally assault the smartphone it infects with unwanted advertisements. Yulong Zhang of FireEye writes that this malware was probably created by Chinese hackers, who have repackaged Kemoge into legitimate apps that are then used to spread the malware. Naturally, the results are devastating. By promoting the applications on websites and other avenues, the malware has managed to spread quite effectively.

According to CIO, Kemoge follows the following process when infecting your device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

In other words, the malware convinces users to download infected apps, the malware scans the device for software vulnerabilities, installs exploits that are designed to allow for remote control, and sends information to a remote server. It’s a dangerous app that, more or less, can result in the complete and total control over your device’s applications, allowing hackers to install, uninstall, or activate applications on the device. It’s been shown that Kemoge can even uninstall any antivirus and antimalware apps, allowing for the further corruption of your device if left unchecked.

First of all, we want to emphasize that downloading legitimate apps through a third-party application distribution center is risky at best. If you’re downloading an app from the Google Play store, it’s much less likely to be malicious than if it’s found on a third-party store. Still, you should always be mindful of all the applications you download, and be sure to pay attention to what permissions you’re giving to your newly downloaded apps.

Second, you want to ensure that your employees who use their mobile devices for work purposes don’t accidentally contract this malware. You can do this by educating them about the importance of mobile device security, as well as integrating a mobile device management solution that allows the restriction of access to sensitive data on an app-by-app basis. You don’t want hackers getting their hands on sensitive data; it could result in some heavy fines and compliance issues that, in turn, lead to a broken budget.

Give Evolve IT a call at (518) 203-2110 for more information about how we can help your organization stay secure.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 26 December 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Computer Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Network Security Ransomware Hardware Office Backup Apps Business Continuity Operating System Disaster Recovery Communication Hacking WiFi The Internet of Things Social Media Facebook Bandwidth Microsoft Office Network Firewall Managed Service Provider Content Filtering Cybercrime Outlook Website Wireless Technology Android Apple Employer-Employee Relationship History Two-factor Authentication Best Practice Small Business Alert Phishing App Networking Data storage Mobile Computing Smartphones Big Data communications Data Windows Experience Safety Unified Threat Management Quick Tips Mobile Device Management Money Remote Computing Shortcut Business Growth Data Management Advertising Automation Recovery DDoS Robot Heating/Cooling Word Society Memory Sports Google Wallet Spam Information Technology Deep Learning Running Cable Business Management Windows 8 BDR Internet of Things IT Services Hosted Solution Windows XP Artificial Intelligence Vendor Management Documents Competition Presentation Entrepreneur Tech Support Compliance Domains Drones Social Monitors Hacker Printer Browser Virtual Desktop Wireless Application Unified Communications Displays Securty Customer Service Document Management Encryption SaaS VoIP Law Enforcement End of Support Cortana Router Proactive IT Office 365 Network Congestion Save Money Writing Analytics Music Saving Money intranet Lithium-ion battery Cryptocurrency Laptop IBM Social Networking Education Google Docs Public Speaking Cleaning Retail Holiday Processors IP Address Virtualization Black Market YouTube LiFi Staffing Office Tips Government BYOD Managed IT services Downtime Help Desk Augmented Reality Keyboard Passwords Streaming Media Visible Light Communication Disaster Search User Micrsooft Hard Drives Bluetooth
QR-Code