Kemoge Malware: A nightmare for Android users.

A malware name Kemoge was discovered by researchers on Wednesday which is effecting Android users in more than 20 countries.The malware was discovered by the Fireeye Researchers which they believe is written by Chinese developers or controlled by Chinese hackers. This malware can only effect users who install third-party apps in their android devices. But still Kemoge is spreading very quickly around the world.

Kemoge tricks a user through ads to install an app from third party source.The apps are duplicates of software that can be found on the Google Play Store. The key difference is that they attack the user’s device after installation.

In a blog post written on Fireeye blog the researchers said that, ” The attacker uploads the apps to third-party app stores and promotes the download links via websites and in-app ads. Some aggressive ad networks gaining root privilege can also automatically install the samples. On the initial launch, Kemoge collects device information and uploads it to the ad server, then it pervasively serves ads from the background. Victims see ad banners periodically regardless of the current activity (ads even pop up when the user stays on the Android home screen).” 

How can a Android user secure himself from Kemoge

The Kemoge Malware is still out there and it has effected many Android users in U.S too. It maybe not reached your country yet but with the way it is spreading it can hit your device before you even know it. Here are the few security tips which can help you prevent this malware from entering your device. 
  • Don’t click on links from Advertisement, Emails, SMS or Websites. Kemoge can enter your device from these platforms. 
  • Try not to install third-party apps, only trust on apps from Android’s App Store. 
  • Always keep you device up to date. Upgrading to the latest version of OS will provide some security, but it does not guarantee that you will remain protected. 
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...