From HummingBad to Worse
New Details and an In-Depth Analysis of the HummingBad Android Malware Campaign
For five months, Check Point researchers had unprecedented access to the inner-workings of Yingmob, the Chinese cyber criminals behind HummingBad, a malware that establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional malicious apps.
Hidden within a legitimate advertising analytics company, Yingmob is highly organized. It controls 85 million devices globally and generates $300,000 per month in fraudulent ad revenue, proving groups like Yingmob can become financially self-sufficient.
Read this report to learn what the investigation uncovered including critical insight about how and why attackers conduct mobile malware campaigns.
DOWNLOAD THE REPORT
*Notice: By clicking submit you agree that the information you provide will be processed in accordance with Check Point's privacy policy.