Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

The network security experts at FireEye have concluded that Kemoge can be found within legitimate applications that are distributed through alternate app stores, and it has already spread to 20 different countries. The adware infects a device by overwhelming the user with unwanted advertisements. Yulong Zhang, a security consultant with FireEye, cites evidence suggesting that this particular strain of malware was created in China, and attached to legitimate applications to get the most bang for their buck. By repackaging this malicious code with legitimate software titles, Kemoge is able to spread effectively.


CIO acknowledges that Kemoge adheres to the following process when infecting a device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

Moreover, the malware suggests that users download other applications infected with the malware, and it scans the device for vulnerabilities. It also installs the exploits that are deployed for remote control, while sending information to a remote server. In essence, it hijacks Android mobile devices and allows the hackers behind it to extract information, and install and uninstall applications. This can render a mobile platform useless.

To combat this potential disaster, we first want to suggest that the only place you should be downloading applications for your Android device is from Google Play. Apps from the official Google Play Store will be less likely to include malicious or hazardous code. It’s also best practice to be mindful of the apps you download, whether you use a company mobile device or not.

From an organizational perspective, you’ll want to ensure that your network’s mobile device users understand your policies regarding the acquisition of new applications. It’s also a good idea to educate them about the importance of mobile device security and the effects it can have on their devices, your network, and the organization as a whole.

At Voyage Technology we have solutions that can improve network security, including comprehensive mobile device management (MDM). The MDM provides administrators with options to restrict access to sensitive data, blacklist and whitelist applications, and even take control of a device to ensure your organization’s sensitive data isn’t exposed. Call one of our trusted IT professionals at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Conferencing Office 365 How To BDR HIPAA Applications Computing Hacker Information Technology Website Health Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Router Operating System Computers 2FA Risk Management Help Desk Virtual Private Network Printer Excel Paperless Office Infrastructure Remote Workers Telephone Firewall Document Management Cooperation Free Resource Project Management The Internet of Things Scam Windows 7 Data loss Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Windows 11 Physical Security Monitoring Display Video Conferencing Computer Repair Managed Services Provider Virtual Machines Virtual Desktop Professional Services Saving Time Data storage LiFi Word Managed IT Service Outlook Machine Learning Downloads Money iPhone Humor Licensing Entertainment Vulnerabilities Safety Maintenance Data Privacy Sports Antivirus Images 101 Mouse Multi-Factor Authentication Mobility Telephone System Cost Management Administration Robot Employees Customer Relationship Management Integration Settings Modem Wireless User Tip Printing Processor Mobile Security Content Filtering Hacking IT Management Holidays YouTube Meetings Presentation VPN Data Storage Cryptocurrency Smart Technology Supply Chain Wireless Technology IP Address Google Docs Addiction Unified Communications Language Employer/Employee Relationships Outsourcing Experience Navigation Management PCI DSS Bitcoin Network Management Chatbots Running Cable Tech Support Google Wallet Screen Reader Distributed Denial of Service Workplace Monitors Gig Economy Service Level Agreement Internet Service Provider Recovery Computing Infrastructure Teamwork Hiring/Firing Laptop Websites Evernote Paperless Regulations Compliance Hard Drives Windows 8 Identity Domains Drones Smart Tech Memes Co-managed IT Bookmark SharePoint Download Net Neutrality Alerts SQL Server Technology Care Electronic Medical Records Halloween Business Communications Financial Data Refrigeration History Public Speaking Lenovo Connectivity IT Break Fix Scams Writing Browsers Smartwatch Lithium-ion battery Upload Procurement Azure Hybrid Work Virtual Reality Entrepreneur Scary Stories Private Cloud Multi-Factor Security Tech Human Resources Social Network Telework Hacks Server Management Cyber security CES Superfish IoT Communitications Identity Theft Dark Web Cables Fun Trends Supply Chain Management Deep Learning Twitter Regulations Error Google Calendar Term Google Apps Customer Resource management FinTech Undo Data Analysis Star Wars IT Assessment Education Microsoft Excel IT Maintenance Social Engineering Gamification Flexibility Staff Value Business Intelligence Remote Computing Social Networking Legislation Shortcuts Organization Mobile Computing Fileless Malware Digital Security Cameras Smart Devices Tablet Ransmoware Search Content Remote Working Application Best Practice Wearable Technology Memory Vendors Alert Motherboard Data Breach Buisness File Sharing Comparison Google Play Be Proactive Dark Data Health IT Managed IT Directions Videos IBM Legal Assessment Electronic Health Records IT solutions Permissions Workforce How To Business Growth Wasting Time Threats Notifications Trend Micro Travel Specifications Security Cameras Workplace Strategies Microchip Techology Internet Exlporer Software as a Service Google Maps Fraud Meta Cortana Username Alt Codes Managing Costs Amazon eCommerce Downtime Unified Threat Management Black Friday SSID Competition Unified Threat Management Database Surveillance Hosted Solution Virtual Assistant Outsource IT Media Typing IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Network Congestion Proxy Server Reviews Google Drive User Error Tactics Development User Hotspot Transportation Small Businesses Knowledge Mirgation Hypervisor Displays Nanotechnology Optimization Point of Sale PowerPoint 5G Shopping

Blog Archive