Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

The researchers at FireEye have come to the conclusion that Kemoge is found within legitimate applications that are distributed through a third-party application store. Kemoge has been found to brutally assault the smartphone it infects with unwanted advertisements. Yulong Zhang of FireEye writes that this malware was probably created by Chinese hackers, who have repackaged Kemoge into legitimate apps that are then used to spread the malware. Naturally, the results are devastating. By promoting the applications on websites and other avenues, the malware has managed to spread quite effectively.

According to CIO, Kemoge follows the following process when infecting your device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

In other words, the malware convinces users to download infected apps, the malware scans the device for software vulnerabilities, installs exploits that are designed to allow for remote control, and sends information to a remote server. It’s a dangerous app that, more or less, can result in the complete and total control over your device’s applications, allowing hackers to install, uninstall, or activate applications on the device. It’s been shown that Kemoge can even uninstall any antivirus and antimalware apps, allowing for the further corruption of your device if left unchecked.

First of all, we want to emphasize that downloading legitimate apps through a third-party application distribution center is risky at best. If you’re downloading an app from the Google Play store, it’s much less likely to be malicious than if it’s found on a third-party store. Still, you should always be mindful of all the applications you download, and be sure to pay attention to what permissions you’re giving to your newly downloaded apps.

Second, you want to ensure that your employees who use their mobile devices for work purposes don’t accidentally contract this malware. You can do this by educating them about the importance of mobile device security, as well as integrating a mobile device management solution that allows the restriction of access to sensitive data on an app-by-app basis. You don’t want hackers getting their hands on sensitive data; it could result in some heavy fines and compliance issues that, in turn, lead to a broken budget.

Give Evolve IT a call at (518) 203-2110 for more information about how we can help your organization stay secure.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Smartphone Windows 10 IT Support Mobile Devices Innovation Network Security Gmail Ransomware Hardware WiFi Bandwidth Facebook Microsoft Office Office Backup Apps Operating System Business Continuity Disaster Recovery Communication Hacking The Internet of Things Social Media Alert Two-factor Authentication History Networking Data storage Small Business Phishing Windows Data App Experience Mobile Computing Big Data communications Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Smartphones Managed Service Provider Outlook Firewall Content Filtering Cybercrime Wireless Technology Website Android Apple Best Practice Employer-Employee Relationship Network Congestion Customer Service Save Money Monitors Music Router Office 365 Cryptocurrency Laptop IBM Displays Google Docs Analytics Education Saving Money Lithium-ion battery Cleaning Holiday intranet YouTube Processors End of Support Black Market Office Tips LiFi Staffing BYOD Downtime Social Networking Public Speaking Streaming Media Help Desk Writing Passwords Micrsooft IP Address Visible Light Communication Virtualization Disaster Data Management Government Business Growth Robot Augmented Reality Advertising Keyboard Recovery Search Society User Sports Hard Drives Spam Retail Google Wallet Remote Computing Information Technology Shortcut Running Cable DDoS Windows 8 Internet of Things Hosted Solution Heating/Cooling Windows XP Word IT Services Managed IT services Artificial Intelligence Documents Compliance Tech Support Drones Business Management Bluetooth Social Browser Automation Printer Competition Presentation Virtual Desktop Entrepreneur Wireless Memory Domains Unified Communications Securty Encryption Deep Learning Document Management Law Enforcement Hacker SaaS VoIP BDR Cortana Vendor Management Proactive IT Application
QR-Code