FacebookInstagramTwitterContact

 

I Live With A Haunted Doll Possessed By A Woman Who Was Killed By Her Husband           >>           Study: The Mediterranean Diet Benefits Adults Of Any Age           >>           Snacking On Superfoods: What Are Activated Almonds And Why Are They Good For You?           >>           The 5 Best Foods To Boost Your Brain Health           >>           Supplementing With Protein And Vitamin D Can Improve Physical Performance In Older People           >>           The Protective Effects Of Walnuts Against Inflammation And Neurodegeneration           >>           Experts Find That Vitamin D Can Soothe Symptoms Of COPD           >>           Blood Donation Campaign           >>           Voting and Selection of Mukim Penghulu           >>           'Menyambut Ketibaan Dhuyufurrahman'           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


Android Malware From Chinese Ad Firm Infects 10 Million Devices


 


 July 6th, 2016  |  09:31 AM  |   1338 views

Engadgets.com

 

The Android malware Hummingbad has infected 10 million devices so far, but what's most interesting is where it comes from. First discovered by the security firm Check Point in February, the researchers have tied it to Yingmob, a highly organized Chinese advertising and analytics company that looks like your typical hum-drum ad firm. Once it successfully infects and sets up a rootkit on Android devices (giving it full administrative control), Hummingbad generates as much as $300,000 a month through fraudulent app installs and ad clicks. As Check Point describes it, Hummingbad is an example of how malware companies can support themselves independently.

 

"Emboldened by this independence, Yingmob and groups like it can focus on honing their skill sets to take malware campaigns in entirely new directions, a trend Check Point researchers believe will escalate," the researchers say. "For example, groups can pool device resources to create powerful botnets, they can create databases of devices to conduct highly-targeted attacks, or they can build new streams of revenue by selling access to devices under their control to the highest bidder."

 

On top of its Hummingbad victims, Yingmob controls around 85 million devices globally. Naturally, the company is also able to sell access to the infected devices, along with sensitive information. And while its attack is global, most victims are in China and India, with 1.6 million and 1.3 million infected users, respectively. iPhone users aren't safe from Yingmob either -- researchers have also found that the group is behind the Yispecter iOS malware. 

 


 

Source:
courtesy of ENGADGET

by Devindra Hardawar

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Taiwan Braces For Fresh Protests Over Controversial New Law

 2024-06-22 01:06:44

Government Borrowing In May Is Highest Since Covid

 2024-06-22 02:36:29