ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

The researchers at FireEye have come to the conclusion that Kemoge is found within legitimate applications that are distributed through a third-party application store. Kemoge has been found to brutally assault the smartphone it infects with unwanted advertisements. Yulong Zhang of FireEye writes that this malware was probably created by Chinese hackers, who have repackaged Kemoge into legitimate apps that are then used to spread the malware. Naturally, the results are devastating. By promoting the applications on websites and other avenues, the malware has managed to spread quite effectively.

According to CIO, Kemoge follows the following process when infecting your device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

In other words, the malware convinces users to download infected apps, the malware scans the device for software vulnerabilities, installs exploits that are designed to allow for remote control, and sends information to a remote server. It’s a dangerous app that, more or less, can result in the complete and total control over your device’s applications, allowing hackers to install, uninstall, or activate applications on the device. It’s been shown that Kemoge can even uninstall any antivirus and antimalware apps, allowing for the further corruption of your device if left unchecked.

First of all, we want to emphasize that downloading legitimate apps through a third-party application distribution center is risky at best. If you’re downloading an app from the Google Play store, it’s much less likely to be malicious than if it’s found on a third-party store. Still, you should always be mindful of all the applications you download, and be sure to pay attention to what permissions you’re giving to your newly downloaded apps.

Second, you want to ensure that your employees who use their mobile devices for work purposes don’t accidentally contract this malware. You can do this by educating them about the importance of mobile device security, as well as integrating a mobile device management solution that allows the restriction of access to sensitive data on an app-by-app basis. You don’t want hackers getting their hands on sensitive data; it could result in some heavy fines and compliance issues that, in turn, lead to a broken budget.

Give ClearView IT a call at 866-326-7214 for more information about how we can help your organization stay secure.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Passwords Holiday Disaster Recovery IT Support Apps Browser Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Remote Work Managed Service Provider Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Bandwidth WiFi Remote Blockchain Server Encryption App Virtualization Information Mobile Device Management Spam Business Technology Information Technology Employee/Employer Relationship Gmail Budget Office Two-factor Authentication History Office 365 Apple Analytics Cybercrime Access Control Data Security Wi-Fi Conferencing Big Data BDR Health Training Remote Computing Document Management Compliance Save Money Patch Management Help Desk Hacking Remote Monitoring Voice over Internet Protocol Employer-Employee Relationship Vendor Cost Management IT Management Hacker Hiring/Firing Customer Service Unified Threat Management Legal Firewall Outlook Password Data storage Augmented Reality Word Data loss IBM Website Project Management BYOD Search... Mobile Office Best Practice Computing Applications Vendor Management Managed Services Hard Drive Retail Alert Vulnerabilities Money Monitoring Scam Sports User Law Enforcement Healthcare Social SaaS End of Support DDoS Printer VPN Update iPhone Chrome Education Cortana Content Filtering Travel Virtual Reality Social Engineering Cryptocurrency Router Paperless Office Mobile Computing Black Market Windows 11 Antivirus Cleaning Maintenance Marketing The Internet of Things YouTube Robot Running Cable Remote Workers Data Breach Websites Storage Laptop Windows 7 Free Resource Meetings Mobility How To Twitter Google Maps Multi-factor Authentication Virtual Desktop Experience How To HIPAA Images 101 Microchip Integration Display Flexibility Saving Time Tech Terms Employees Bitcoin Identity Theft Disaster Computers Hack Managed IT Notifications Avoiding Downtime Unified Communications Telephone Digital Holidays Google Docs Lithium-ion battery Bluetooth Taxes PowerPoint Excel Cooperation Distributed Denial of Service Administration Video Conferencing Office Tips Private Cloud Memory Processors Presentation Virtual Machines Specifications Computer Repair IT Consultant Physical Security Virtual Assistant Professional Services Politics Machine Learning Customer Relationship Management Settings Co-Managed IT Entertainment Start Menu Computer Care Wireless Technology Managed Services Provider Downloads Solid State Drive Processor eWaste Vulnerability Virtual Private Network Software as a Service Chromebook Downtime Drones Data Protection Safety Current Events Automobile Solutions Advertising Relocation Supply Chain Management Displays Motion Sickness Value Organization Fake News Work/Life Balance Cyber security Tech Support Shortcuts Proxy Server Comparison Emails Google Drive Service Level Agreement Computing Infrastructure Smart Devices Management Knowledge Device security Corporate Profile Remote Working AI Microsoft Excel Employer Employee Relationship Staffing Trend Micro Be Proactive Television Wireless Headphones In Internet of Things Telephony Going Green Business Owner Digital Security Cameras Business Cards Hacks Cabling Electronic Health Records Network Congestion IP Address Transportation Tech Wasting Time Error Reliable Computing Tablet Writing G Suite Tracking eCommerce Modem Workplace Strategies Bookmark Mouse VoIP Download Videos Piracy Surveillance Term Managing Costs HTML Scalability Web Server Text Messaging Digital Payment Recovery Proactive IT Competition SSID Browsers SharePoint Nanotechnology Administrator Upload Inbound Marketing Media Software License Bring Your Own Device Worker Development Employer/Employee Relationships Google Play Virtual Machine Entrepreneur Social Network Access LiFi Reviews Public Cloud Documents Optimization Music Application Smart Technology Data Analysis Screen Reader Time Management Trends 2FA Mobile Technology Teamwork Security Cameras Business Intelligence Hypervisor Customer Resource management Audit Electronic Payment Devices Spyware Data Storage Shopping Tip of the week File Sharing Securty Medical IT Fileless Malware Botnet Gamification Redundancy Paperless Company Culture Rental Service Micrsooft Domains SQL Server Licensing Telephone System Regulations Cache Phone System PCI DSS Flash Unified Threat Management Gig Economy Telephone Systems Workers Humor Business Growth Supply Chain Directions Backup and Disaster Recovery Content Business Communications Desktop Internet Service Provider Azure CCTV Managed IT Service Electronic Medical Records Printing Accountants Regulations Compliance Touchscreen Banking Memes Google Wallet Public Speaking Workplace Database Emergency Human Resources Messenger Streaming Media Computer Accessories Net Neutrality Deep Learning Computer Malfunction Keyboard Health IT Equifax Vendor Mangement Financial Data Risk Management Hard Drive Disposal Business Metrics Samsung IT Hosted Solution Hard Drives Scams Tactics intranet Username Google Apps Books Uninterrupted Power Supply Webcam Wireless Society Shortcut Startup Business Mangement Telework Freedom of Information Language Smartwatch email scam Tablets Communitications Heating/Cooling Microsoft 365 Cables Navigation Environment Addiction Social Networking Mobile Security Reading Windows XP Procurement Monitors Visible Light Communication Supercomputer Windows 8 User Tip Google Calendar Legislation FinTech News Network Management Virus Troubleshooting CES IT Assessment Point of Sale Evernote

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?