The HummingBad Android malware, which affected about 10 million devices with its ad fraud activities, resurfaced...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
as HummingWhale, and was being distributed through 20 apps in the Google Play Store. What are the new features of HummingWhale, and how do they work?
As malware and ad developers begin to adopt good ideas and learn from each other to advance their goals, the distinction between malware and adware continues to be blurred. Mobile malware developers seem to be rapidly adopting functionality for generating revenue from their malware.
Check Point researchers discovered a new variant of the HummingBad mobile malware, named HummingWhale, which uses virtual machines as part of its effort to evade antifraud detection in order to generate ad revenue. The HummingWhale malware also tries to raise its reputation in the Google Play Store by using fraudulent ratings and comments, much like the Gooligan malware. It was also found on third-party app stores.
Once the HummingWhale malware is on the endpoint, it downloads a dropper used to further download DroidPlugin. Fake ads and apps are displayed to the user, and when the user attempts to close out the ads, fraudulent apps are uploaded onto the virtual machine. This creates a fake referrer ID, which the HummingWhale malware uses to generate revenue. By using this technique, it can also bypass security checks on the endpoint.
An app with the ability to download external content seems like it could be at high risk, and would be something Google would only cautiously allow, as it is difficult to determine all of the actions an executable might take.
The standard security advice is to only download apps from trusted app stores and to look for highly rated apps, but as HummingWhale demonstrates, this may be insufficient to adequately protect a device. Users should install a third-party security tool, as well.
Learn how to detect the autorooting Android malware LevelDropper
Find out how a malicious app containing a banking Trojan was able to bypass the Google Play Store's security
Discover how the Switcher Android Trojan carries out attacks on wireless routers
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
The Hajime IoT worm aims to help users tighten up security, whether they want to or not, but it's probably not a good security strategy. Expert Nick ...continue reading
As the Magento Community Edition suffers a new zero-day vulnerability, expert Nick Lewis explains how it's being exploited and how to mitigate the ...continue reading
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.