Kemoge Malware: A nightmare for Android users.

A malware name Kemoge was discovered by researchers on Wednesday which is effecting Android users in more than 20 countries.The malware was discovered by the Fireeye Researchers which they believe is written by Chinese developers or controlled by Chinese hackers. This malware can only effect users who install third-party apps in their android devices. But still Kemoge is spreading very quickly around the world.

Kemoge tricks a user through ads to install an app from third party source.The apps are duplicates of software that can be found on the Google Play Store. The key difference is that they attack the user’s device after installation.

In a blog post written on Fireeye blog the researchers said that, ” The attacker uploads the apps to third-party app stores and promotes the download links via websites and in-app ads. Some aggressive ad networks gaining root privilege can also automatically install the samples. On the initial launch, Kemoge collects device information and uploads it to the ad server, then it pervasively serves ads from the background. Victims see ad banners periodically regardless of the current activity (ads even pop up when the user stays on the Android home screen).” 

How can a Android user secure himself from Kemoge

The Kemoge Malware is still out there and it has effected many Android users in U.S too. It maybe not reached your country yet but with the way it is spreading it can hit your device before you even know it. Here are the few security tips which can help you prevent this malware from entering your device. 
  • Don’t click on links from Advertisement, Emails, SMS or Websites. Kemoge can enter your device from these platforms. 
  • Try not to install third-party apps, only trust on apps from Android’s App Store. 
  • Always keep you device up to date. Upgrading to the latest version of OS will provide some security, but it does not guarantee that you will remain protected. 
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.