Misplaced Pages

Hummingbad

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Android Malware, discovered in February 2016

HummingBad is Android malware, discovered by Check Point in February 2016.

In July 2016, researchers from security firm Check Point Software said the malware installs more than 50,000 fraudulent apps each day, displays 20 million malicious advertisements, and generates more than $300,000 per month in revenue. The research pointed out the Yingmob group, previously accused of being responsible for the Yispecter iOS malware, as responsible for the attack.

Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted.

The most infected region was Asia which included China, India, Philippines, Indonesia and Turkey as the top countries.

See also

References

  1. "HummingBad: A Persistent Mobile Chain Attack". checkpoint.com. 4 February 2016. Retrieved 9 October 2016.
  2. Dan Goodin - Jul 7, 2016 5:50 pm UTC (2016-07-07). "10 million Android phones infected by all-powerful auto-rooting apps". Ars Technica. Retrieved 2016-10-02.{{cite web}}: CS1 maint: numeric names: authors list (link)
  3. "From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign". Check Point Blog. 2016-07-01. Retrieved 2016-10-09.
  4. "YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs - Palo Alto Networks Blog". Palo Alto Networks Blog. 2015-10-04. Retrieved 2016-10-09.
  5. "Another month, another new rooting malware family for Android". elevenpaths.com. Archived from the original on 10 October 2016. Retrieved 9 October 2016.
  6. "DIY Attribution, Classification, and In-depth Analysis of Mobile Malware". checkpoint.com. 11 July 2016. Retrieved 9 October 2016.
  7. Goodin, Dan (7 July 2016). "10 million Android phones infected by all-powerful auto-rooting apps". Ars Technica.
Categories: