Search This Blog
Cyber Security, Hacking News, OpenSource, Linux, Shaikh Sardar Salim, LatestHackingNews, HackingNews, TheHackingNews, The Hacking News, Latest Hacking News, CyberSecurityBlog, CyberSecurity, Security, Digital Security, Social Security, SocialMediaSecurity, Social Media, Facebook, Google, Twitter, Instagram, Bugs, Malwares, Viruses, Virus, Malware, Ransomware
- Get link
- X
- Other Apps
The software gained root access on the affected devices and started collecting personal data and made it look like they are clicking on ads. They folks behind this made around $300,000 per month.
The malware was spread using third-party app stores and has managed to reach so many devices that it has become the fourth most prevalent malware known. However, it did not manage to infiltrate the official Google Play store.
The new version was dubbed as HummingWhale by the folks at Check Point Software Technologies who first spotted it and saw that it has improved add fraud capabilities in its code. So, if the user spots the app and goes to close the app process then HummingWhale will go under and turns into a virtual machine which is way lot harder to detect.
The new HummingWhale started gaining attention when the apps that were published under the names of several Chinese developers (possibly fake developers) showed the behaviour that was not normal at the startup. “It registered several events on boot, such as TIME_TICK, SCREEN_OFF and INSTALL_REFERRER which [were] dubious in that context,” wrote Check Point. They also carried an encrypted file of 1.3 MB posing as an image but acting as an executable app file.
Ads
Popular Posts
This Android Malware Attacks Your Wi-Fi Router And Hijacks Web Traffic
- Get link
- X
- Other Apps
