Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

The researchers at FireEye have come to the conclusion that Kemoge is found within legitimate applications that are distributed through a third-party application store. Kemoge has been found to brutally assault the smartphone it infects with unwanted advertisements. Yulong Zhang of FireEye writes that this malware was probably created by Chinese hackers, who have repackaged Kemoge into legitimate apps that are then used to spread the malware. Naturally, the results are devastating. By promoting the applications on websites and other avenues, the malware has managed to spread quite effectively.

According to CIO, Kemoge follows the following process when infecting your device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

In other words, the malware convinces users to download infected apps, the malware scans the device for software vulnerabilities, installs exploits that are designed to allow for remote control, and sends information to a remote server. It’s a dangerous app that, more or less, can result in the complete and total control over your device’s applications, allowing hackers to install, uninstall, or activate applications on the device. It’s been shown that Kemoge can even uninstall any antivirus and antimalware apps, allowing for the further corruption of your device if left unchecked.

First of all, we want to emphasize that downloading legitimate apps through a third-party application distribution center is risky at best. If you’re downloading an app from the Google Play store, it’s much less likely to be malicious than if it’s found on a third-party store. Still, you should always be mindful of all the applications you download, and be sure to pay attention to what permissions you’re giving to your newly downloaded apps.

Second, you want to ensure that your employees who use their mobile devices for work purposes don’t accidentally contract this malware. You can do this by educating them about the importance of mobile device security, as well as integrating a mobile device management solution that allows the restriction of access to sensitive data on an app-by-app basis. You don’t want hackers getting their hands on sensitive data; it could result in some heavy fines and compliance issues that, in turn, lead to a broken budget.

Give Evolve IT a call at (518) 203-2110 for more information about how we can help your organization stay secure.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 09 March 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Upgrade Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Operating System The Internet of Things Social Media Microsoft Office Office Backup Bandwidth Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Mobile Computing communications Wireless Technology Big Data Safety Android Unified Threat Management Apple Quick Tips Smartphones Best Practice Alert Firewall Networking Data storage Content Filtering Cybercrime Data Windows Experience Website Money Employer-Employee Relationship Mobile Device Management Network History Two-factor Authentication Small Business Managed Service Provider Phishing Outlook App Compliance Tech Support Drones Social Networking Social End of Support Browser Public Speaking Printer Virtualization Virtual Desktop Wireless IP Address Writing Unified Communications Securty Encryption Government Document Management Keyboard Law Enforcement SaaS VoIP Augmented Reality Search User Cortana Hard Drives Proactive IT Shortcut Network Congestion Remote Computing Retail DDoS Save Money Music Heating/Cooling Word Laptop Managed IT services Cryptocurrency IBM Business Management Google Docs Education Holiday Bluetooth Competition Cleaning Black Market YouTube Processors Presentation Entrepreneur Office Tips LiFi Staffing Automation Domains Downtime Memory BYOD Passwords Streaming Media Help Desk Hacker Micrsooft Visible Light Communication Disaster Deep Learning BDR Application Business Growth Data Management Customer Service Robot Advertising Recovery Vendor Management Sports Society Google Wallet Spam Router Information Technology Running Cable Monitors Office 365 Internet of Things Windows 8 Hosted Solution Saving Money Windows XP IT Services Analytics intranet Artificial Intelligence Documents Displays Lithium-ion battery
QR-Code