Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

The network security experts at FireEye have concluded that Kemoge can be found within legitimate applications that are distributed through alternate app stores, and it has already spread to 20 different countries. The adware infects a device by overwhelming the user with unwanted advertisements. Yulong Zhang, a security consultant with FireEye, cites evidence suggesting that this particular strain of malware was created in China, and attached to legitimate applications to get the most bang for their buck. By repackaging this malicious code with legitimate software titles, Kemoge is able to spread effectively.


CIO acknowledges that Kemoge adheres to the following process when infecting a device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

Moreover, the malware suggests that users download other applications infected with the malware, and it scans the device for vulnerabilities. It also installs the exploits that are deployed for remote control, while sending information to a remote server. In essence, it hijacks Android mobile devices and allows the hackers behind it to extract information, and install and uninstall applications. This can render a mobile platform useless.

To combat this potential disaster, we first want to suggest that the only place you should be downloading applications for your Android device is from Google Play. Apps from the official Google Play Store will be less likely to include malicious or hazardous code. It’s also best practice to be mindful of the apps you download, whether you use a company mobile device or not.

From an organizational perspective, you’ll want to ensure that your network’s mobile device users understand your policies regarding the acquisition of new applications. It’s also a good idea to educate them about the importance of mobile device security and the effects it can have on their devices, your network, and the organization as a whole.

At Voyage Technology we have solutions that can improve network security, including comprehensive mobile device management (MDM). The MDM provides administrators with options to restrict access to sensitive data, blacklist and whitelist applications, and even take control of a device to ensure your organization’s sensitive data isn’t exposed. Call one of our trusted IT professionals at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Email Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Data Security Vendor Mobile Office Two-factor Authentication Managed Services Employer-Employee Relationship App BYOD Mobile Device Management Voice over Internet Protocol Tip of the week Chrome Gmail Budget WiFi Apple Networking How To BDR HIPAA Hacker Computing Physical Security Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing Managed IT Services Computers Operating System Router 2FA Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Healthcare Augmented Reality Retail Storage Password Big Data Bring Your Own Device Cooperation Solutions Going Green Patch Management Save Money Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Windows 11 Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Firewall Document Management Managed IT Service Free Resource The Internet of Things Telephone Project Management Scam Windows 7 Data loss Social Microsoft 365 Customer Relationship Management Telephone System Employees Robot Integration Cost Management Settings Printing Wireless Hacking Presentation Content Filtering IT Management VPN YouTube Meetings Holidays Wireless Technology Data Storage Cryptocurrency User Tip Modem Supply Chain Processor Video Conferencing Computer Repair Mobile Security Managed Services Provider Virtual Desktop Virtual Machines Professional Services Word Data storage LiFi Smart Technology Outlook Machine Learning Money Saving Time iPhone Humor Safety Vulnerabilities Data Privacy Maintenance Antivirus Sports Downloads Mouse Images 101 Licensing Multi-Factor Authentication Mobility Entertainment Administration Remote Working Alert Memory Vendors IBM Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Data Breach Dark Data Google Calendar Google Play Be Proactive Workforce Legal Data Analysis Videos IT solutions Star Wars Electronic Health Records How To Microsoft Excel Notifications Staff Wasting Time Threats Business Growth Gamification Travel Social Networking Trend Micro Legislation Security Cameras Workplace Strategies Meta Competition Techology Fileless Malware Google Maps Software as a Service Cortana Wearable Technology Managing Costs Amazon Alt Codes Content Health IT Downtime Unified Threat Management Motherboard eCommerce Comparison SSID Virtual Assistant Outsource IT Unified Threat Management Directions Hosted Solution Assessment Surveillance Permissions Virtual Machine Environment Media User Typing Reviews Network Congestion Specifications Medical IT Transportation Small Businesses Google Drive User Error Microchip Internet Exlporer Development Knowledge Fraud Hypervisor Displays IP Address Username Shopping Point of Sale Optimization 5G Black Friday PowerPoint Employer/Employee Relationships Outsourcing Google Docs Unified Communications Database Experience Bitcoin Network Management PCI DSS Running Cable Tech Support IT Technicians Navigation Recovery Google Wallet Proxy Server Gig Economy Cookies Monitors Cyber Monday Workplace Hard Drives Hotspot Teamwork Hiring/Firing Domains Tactics Internet Service Provider Windows 8 Regulations Compliance Laptop Websites Mirgation Evernote Paperless Drones Nanotechnology Memes Co-managed IT Refrigeration Electronic Medical Records Language SQL Server Technology Care Public Speaking SharePoint Addiction Net Neutrality Management Financial Data Halloween Chatbots History Lithium-ion battery Business Communications Entrepreneur Lenovo Smartwatch Screen Reader IT Writing Distributed Denial of Service Scams Virtual Reality Computing Infrastructure Azure Hybrid Work Service Level Agreement Procurement Hacks Server Management Telework Scary Stories Private Cloud Identity Cyber security Tech Human Resources Superfish Bookmark CES Identity Theft Smart Tech Communitications Fun Cables Undo Twitter Alerts Deep Learning Download Supply Chain Management FinTech Error Term Google Apps Browsers Education Connectivity IT Assessment Social Engineering Break Fix IT Maintenance Remote Computing Value Business Intelligence Upload Flexibility Mobile Computing Social Network Organization Multi-Factor Security Shortcuts Application Digital Security Cameras Tablet IoT Smart Devices Search Dark Web Ransmoware

Blog Archive