facebook linkedin twitter

Computerware Blog

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

The researchers at FireEye have come to the conclusion that Kemoge is found within legitimate applications that are distributed through a third-party application store. Kemoge has been found to brutally assault the smartphone it infects with unwanted advertisements. Yulong Zhang of FireEye writes that this malware was probably created by Chinese hackers, who have repackaged Kemoge into legitimate apps that are then used to spread the malware. Naturally, the results are devastating. By promoting the applications on websites and other avenues, the malware has managed to spread quite effectively.

According to CIO, Kemoge follows the following process when infecting your device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

In other words, the malware convinces users to download infected apps, the malware scans the device for software vulnerabilities, installs exploits that are designed to allow for remote control, and sends information to a remote server. It’s a dangerous app that, more or less, can result in the complete and total control over your device’s applications, allowing hackers to install, uninstall, or activate applications on the device. It’s been shown that Kemoge can even uninstall any antivirus and antimalware apps, allowing for the further corruption of your device if left unchecked.

First of all, we want to emphasize that downloading legitimate apps through a third-party application distribution center is risky at best. If you’re downloading an app from the Google Play store, it’s much less likely to be malicious than if it’s found on a third-party store. Still, you should always be mindful of all the applications you download, and be sure to pay attention to what permissions you’re giving to your newly downloaded apps.

Second, you want to ensure that your employees who use their mobile devices for work purposes don’t accidentally contract this malware. You can do this by educating them about the importance of mobile device security, as well as integrating a mobile device management solution that allows the restriction of access to sensitive data on an app-by-app basis. You don’t want hackers getting their hands on sensitive data; it could result in some heavy fines and compliance issues that, in turn, lead to a broken budget.

Give Computerware a call at (703) 821-8200 for more information about how we can help your organization stay secure.

Tip of the Week: How to Prepare Your Organization ...
Public Cloud? Private Cloud? Why Not Both!


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, April 04, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Productivity Computer Google User Tips Innovation IT Support Small Business Smartphones IT Support Data Backup Mobile Devices VoIP Quick Tips Business Continuity Network communications Collaboration Gadgets Android Data Recovery Microsoft Office Upgrade Social Media Cybersecurity Mobile Office Server Disaster Recovery Communication Virtualization Smartphone Miscellaneous Mobile Device Management Phishing Ransomware Holiday Windows Passwords Outsourced IT Tech Term Windows 10 Operating System Vendor Management Apps Facebook Internet of Things Managed IT Services Remote Monitoring Unified Threat Management Automation Mobile Device BDR Analytics Users Managed IT services BYOD Mobile Computing Remote Computing Apple Data Management Windows 10 WiFi Marketing Artificial Intelligence History The Internet of Things Firewall Browser Cloud Computing Save Money Training Help Desk Alert Big data App Information Technology Business Technology Two-factor Authentication Bandwidth Office Encryption IT Consultant Spam Office 365 Hard Drives Going Green Gmail Government Bring Your Own Device Maintenance Cybercrime Managed IT Printer Antivirus Health Access Control Content Filtering Windows 7 Hiring/Firing Best Practice Lithium-ion Battery Budget Outlook Information Windows 8 Computers Saving Time VPN Healthcare Recovery Wireless Technology Employer-Employee Relationship Virus Search Retail Tech Support Cost Management Managed Service Document Management Blockchain IBM Data Loss Computing Customer Service Augmented Reality Travel Education Humor Project Management Update Hacking Phone System iPhone Networking It Management Money Regulations Patch Management Proactive IT File Sharing Computer Repair Running Cable Customer Relationship Management Hard Drive SaaS Wireless PowerPoint Data Breach Mobility Intranet Law Enforcement Twitter Storage Website Administration Solid State Drive Compliance Data storage Risk Management Applications Password Value Avoiding Downtime Save Time Conferencing Hacker Downtime Legal Current Events Monitoring Comparison Tablet Company Culture Paperless Office User Excel Virtual Desktop Sports Management Social Scam Disaster Social Networking Fax Server Hosted Solution Google Maps End of Support DDoS Vulnerabilities Robot Cooperation Social Engineering Securty Vendor Digital Websites Word Meetings Flexibility Black Market Private Cloud Cortana Software as a Service Wi-Fi Cryptocurrency Telephony Laptop Business Intelligence Business Growth Digital Payment Machine Learning Router Telephone Systems Voice over Internet Protocol Data Security Public Cloud Licensing User Error Presentation Co-managed IT Managed Services Provider Trending Downloads YouTube Safety Identity Theft Unified Communications Settings Mouse Specifications Multi-factor Authentication Smart Devices Programming Documents Telephone Lifestyle Managed Services Redundancy Statistics Entertainment Managed IT Service Gaming Console Virtual Reality Teamwork Heating/Cooling Politics Network Congestion Evernote Automobile IT service Emails Text Messaging Chromebook Virtual Assistant Webcam Processor Computing Infrastructure Hack Streaming Media How To Bluetooth Start Menu Tech Terms eWaste Download Mobile Technology Distribution Net Neutrality Memory Chrome Professional Services Inbound Marketing Uninterrupted Power Supply Google Docs Vulnerability Microchip Taxes Experience Processors Bitcoin Distributed Denial of Service Cleaning Integration Monitors Pain Points Computer Accessories USB Data Protection Office Tips cache Television Windows XP Modem Strategy Hacks Physical Security Staffing Google Wallet UTM IT Content IP Address Proxy Server Azure Legislation Error Human Resources Term Banking Botnet Society LinkedIn IT Plan Enterprise Resource Planning Application Webinar Electronic Medical Records Transportation WannaCry Relocation Tablets Displays A.I. Directions Display Upselling Time Management Freedom of Information Sync email scam Addiction Recording Optimization Corporate Profile Micrsooft Accountants Development Assessment SharePoint Archive SSID How To Video Surveillance Notifications CCTV Drones Skype Dark Web Free Resource Wireless Headphones Processing Business Metrics Tip of the week Computer Malfunction Migration Digital Signature Connected Devices Health IT Employee/Employer Relationship Saving ZTime Google Calendar Reliable Computing Equifax Video Conferencing Fleet Tracking Wasting Time Touchscreen News In Internet of Things Permissions Language Network Management Logistics Virtual Machines VoIP Point of Contact Harddrive Consultation Best Practives Cyber security Debate Knowledge Device security Communitications MSP Bookmark Writing Nanotechnology PDF Social Network Google Play Telephone Service GPS Motion Sickness Music Desktop Finance Employer/Employee Relationships Technology Tips Scalability switches Startup Asset Tracking Microserver Managing Costs Fake News Recycling Business Cards Best Available Service Level Agreement Keyboard Microsoft 365 External Harddrive Audit Messenger Tracking Upgrades Analytic Data Warehousing LiFi Unified Threat Management Backup and Disaster Recovery Medical IT Trend Micro Rental Service Product Reviews IT Assessment Username Domains Browsers Read Screen Reader Customer Resource management Get More Done Security Cameras Threats 3D Ebay Emergency Hard Drive Disposal Web Server Gamification Public Speaking User Tip Proactive Maintenance Thin CLient Access Cabling Smart Tech Turn Key Navigation Virtual Machine Microsoft Excel Administrator Work/Life Balance Piracy Upload Shortcut Printer Server Solutions Smart Phones Computer Care Books Workers Deep Learning Data Analysis Employees Google Drive Windows Server 2008 Visible Light Communication Device Management Fiber-Optic Database Entrepreneur Trojan eCommerce Supercomputer HTML Troubleshooting Electronic Health Records Worker IT consulting Content Management Environment Telephone System GDPR Managing Risk Adminstration Pirating Information Business Managemenet Mobile Security HIPAA Memes Organize SQL Server Leadership Spyware Mobile Payment Multi-Factor Security Electronic Payment Cost Tech Hypervisor Software License Trends Competition Electricity Printing Reading Samsung Fileless Malware Hybrid Cloud G Suite Advertising Flash online Currency Fraud Tactics Holidays Employer Employee Relationship CIO Devices Business Owner Surveillance CrashOverride Personal Information Internet Service Provider Capital Financial Productuvuty 3D Printing Managing Stress Printers Regulation