Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

The network security experts at FireEye have concluded that Kemoge can be found within legitimate applications that are distributed through alternate app stores, and it has already spread to 20 different countries. The adware infects a device by overwhelming the user with unwanted advertisements. Yulong Zhang, a security consultant with FireEye, cites evidence suggesting that this particular strain of malware was created in China, and attached to legitimate applications to get the most bang for their buck. By repackaging this malicious code with legitimate software titles, Kemoge is able to spread effectively.

CIO acknowledges that Kemoge adheres to the following process when infecting a device:

Kemoge not only displays unwanted ads, but it's also loaded with eight root exploits that target a wide range of Android devices [...] A successful attack using those exploits means an attacker would have complete control over the device. Kemoge will collect a device's IMEI (International Mobile Station Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers, information on storage and apps, and send the information to a remote server.

Moreover, the malware suggests that users download other applications infected with the malware, and it scans the device for vulnerabilities. It also installs the exploits that are deployed for remote control, while sending information to a remote server. In essence, it hijacks Android mobile devices and allows the hackers behind it to extract information, and install and uninstall applications. This can render a mobile platform useless.

To combat this potential disaster, we first want to suggest that the only place you should be downloading applications for your Android device is from Google Play. Apps from the official Google Play Store will be less likely to include malicious or hazardous code. It’s also best practice to be mindful of the apps you download, whether you use a company mobile device or not.

From an organizational perspective, you’ll want to ensure that your network’s mobile device users understand your policies regarding the acquisition of new applications. It’s also a good idea to educate them about the importance of mobile device security and the effects it can have on their devices, your network, and the organization as a whole.

At Telesys Voice and Data we have solutions that can improve network security, including comprehensive mobile device management (MDM). The MDM provides administrators with options to restrict access to sensitive data, blacklist and whitelist applications, and even take control of a device to ensure your organization’s sensitive data isn’t exposed. Call one of our trusted IT professionals at (800) 588-4430 to learn more.


No comments yet
Already Registered? Login Here
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Productivity Business Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Data Backup Productivity Managed Service Provider Ransomware Innovation Backup Outsourced IT Mobile Devices Business Continuity Hardware Smartphone Google Android Managed IT services Efficiency Upgrade User Tips Disaster Recovery Data Recovery Social Media Browser Communication Data IT Support Workplace Tips Small Business Managed IT Services Cloud Computing Business Management IT Support Smartphones Data Management App Miscellaneous Server Holiday Microsoft Office Internet of Things Office Phishing Remote Monitoring communications Paperless Office WiFi Office 365 Windows Network Password Facebook Encryption VoIP Tech Term Save Money Spam Passwords Artificial Intelligence Gmail Big Data Cybersecurity Apps Hosted Solution Recovery Robot Customer Relationship Management Employer-Employee Relationship Risk Management Collaboration Apple Windows 10 Bandwidth Firewall Document Management Unified Threat Management Saving Money Remote Computing Downtime How To Wi-Fi Office Tips Government Compliance Money Chrome Work/Life Balance Analytics Managed IT Infrastructure Avoiding Downtime Word Hacker Vendor Management Mobile Device Management Tip of the week Customer Service Operating System Content Filtering Data Security Social Business Growth Presentation Healthcare Website Virtual Reality Training IT Management Outlook SaaS Managed Service Windows 7 BYOD Mobile Device Antivirus Two-factor Authentication Settings Redundancy Applications Project Management Data loss BDR The Internet of Things Computers Health Business Technology File Sharing Hacking Mobile Computing Telephone Systems Tech Support Automation Going Green Education Alert Printing Cybercrime Data storage Vulnerability Computing Help Desk Assessment Wireless Technology Server Management Licensing Wireless Computer Care Virtual Private Network Consultation Digital Payment Specifications Maintenance YouTube Unified Communications Regulations User Automobile Upgrades Budget LiFi End of Support Net Neutrality Tablet Retail Proactive Mouse Smart Technology Best Practice Lithium-ion battery Business Owner Remote Monitoring and Management Legal HIPAA Software as a Service Augmented Reality Display Router Mobile Security IBM Running Cable Marketing Twitter Politics Monitors Travel Google Drive Laptops Bring Your Own Device Search Sports Competition Websites IT service Physical Security Taxes Patch Management Solid State Drive Cortana Identity Theft Virtualization Botnet Information Technology Scam Administration Access Control Humor Samsung IT solutions Safety Meetings Analyitcs Storage VPN Cyberattacks Microsoft Excel IT Budget Troubleshooting Relocation Utility Computing Electronic Medical Records business network infrastructure Cables Google Wallet Virtual Assistant Cooperation Downloads Webcam Experience Crowdsourcing Monitoring Dark Data Batteries Bitcoin Fort Worth Bookmarks Blockchain Private Cloud Phone System Techology Wires Drones Statistics Voice over Internet Protocol Staff Software Tips Multi-Factor Security Point of Sale flu shot Electronic Health Records Mail Merge Remote Work Windows 8 Cost Management Favorites Permissions Domains Error Disaster Resistance Entrepreneur Bluetooth Flexibility Google Calendar 5G Fort Worth IT Application Address File Management Corporate Profile Hard Drive Quick Tips Conferencing Fraud Users Public Speaking Proactive IT Update MSP Manufacturing Operations History Legislation Web Server DFW IT Service Telephone Social Networking WannaCry Recycling Time Management Employees iPhone Administrator 3D Printing IT Consulting Chromebook Mobility Gadgets Wearable Technology Cabling Cameras Laptop Staffing Hard Drives Law Enforcement Network Congestion Mobile VoIP Motherboard Management Network Management Zero-Day Threat Internet Exlporer Virtual Desktop Unsupported Software Data Breach Emoji Proactive Maintenance CCTV Distributed Denial of Service Halloween GPS Refrigeration Gadget VoIP Technology Laws Enterprise Resource Planning Hacks Touchscreen Backup and Disaster Recovery Google Maps data services Mobile Data WPA3 Processor IT Technicians Deep Learning Disaster Technology Tips Fun Digital Managed IT Service Scary Stories Tracking PowerPoint Lenovo Modem Unified Threat Management Mobile Current Events RMM Hotspot User Error Consumers Processors Fleet Tracking Shortcut Mirgation Uninterrupted Power Supply Comparison G Suite Spyware Break Fix Undo Superfish Cookies business communications systems Company Culture Procurement Language Printer IP Address Motion Sickness Asset Tracking Google Docs Active Directory Migration Alt Codes Black Friday How To Dark Web eWaste Writing Nanotechnology Personal Information Internet Protocol IT Sevices Vulnerabilities Heating/Cooling Remote Worker Computing Infrastructure Mobile Office IT Consultant Remote Workers Windows Server Chatbots Typing Hard Disk Drive Cyber Monday Firefox Data Warehousing Buisness Supercomputer Environment Machine Learning Social Engineering Networking IoT Computer Repair VoIP streamlines Geography Servers Professional Services Alerts SharePoint Knowledge Cleaning Notifications Information User Management Identity Cryptocurrency flu season

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...