Hummingbad

{{Short description|Android Malware, discovered in February 2016}}

HummingBad is Android malware, discovered by Check Point in February 2016.{{cite web|url=http://blog.checkpoint.com/2016/02/04/hummingbad-a-persistent-mobile-chain-attack/|title=HummingBad: A Persistent Mobile Chain Attack|date=4 February 2016|work=checkpoint.com|accessdate=9 October 2016}}

In July 2016, researchers from security firm Check Point Software said the malware installs more than 50,000 fraudulent apps each day, displays 20 million malicious advertisements, and generates more than $300,000 per month in revenue.{{cite web|url=https://arstechnica.com/security/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/|title=10 million Android phones infected by all-powerful auto-rooting apps|date=2016-07-07|publisher=Ars Technica|author=Dan Goodin - Jul 7, 2016 5:50 pm UTC|accessdate=2016-10-02}}{{Cite web|url=http://blog.checkpoint.com/2016/07/01/from-hummingbad-to-worse-new-in-depth-details-and-analysis-of-the-hummingbad-andriod-malware-campaign/|title=From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign|date=2016-07-01|website=Check Point Blog|access-date=2016-10-09}} The research pointed out the Yingmob group, previously accused of being responsible for the Yispecter iOS malware, as responsible for the attack.{{Cite news|url=http://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/|title=YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs - Palo Alto Networks Blog|date=2015-10-04|newspaper=Palo Alto Networks Blog|language=en-US|access-date=2016-10-09}}

Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted.{{cite web|url=http://blog.elevenpaths.com/2016/07/another-month-another-new-rooting.html|title=Another month, another new rooting malware family for Android|work=elevenpaths.com|accessdate=9 October 2016|archive-date=10 October 2016|archive-url=https://web.archive.org/web/20161010173521/http://blog.elevenpaths.com/2016/07/another-month-another-new-rooting.html|url-status=dead}}{{cite web|url=http://blog.checkpoint.com/2016/07/11/diy-attribution-classification-depth-analysis-mobile-malware/|title=DIY Attribution, Classification, and In-depth Analysis of Mobile Malware|date=11 July 2016|work=checkpoint.com|accessdate=9 October 2016}}

The most infected region was Asia which included China, India, Philippines, Indonesia and Turkey as the top countries.{{cite web |last1=Goodin |first1=Dan |title=10 million Android phones infected by all-powerful auto-rooting apps |url=https://arstechnica.com/information-technology/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/ |website=Ars Technica |language=en-us |date=7 July 2016}}

See also

References