33:
In July 2016, researchers from security firm Check Point
Software said the malware installs more than 50,000 fraudulent apps each day, displays 20 million malicious advertisements, and generates more than $ 300,000 per month in revenue. The research pointed out the Yingmob group, previously accused
194:
219:
301:
180:
244:
159:
274:
220:"YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs - Palo Alto Networks Blog"
330:
51:
The most infected region was Asia which included China, India, Philippines, Indonesia and Turkey as the top countries.
132:
111:
101:
252:
96:
195:"From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign"
41:
86:
76:
35:
174:
325:
106:
71:
319:
23:
81:
27:
66:
275:"DIY Attribution, Classification, and In-depth Analysis of Mobile Malware"
91:
302:"10 million Android phones infected by all-powerful auto-rooting apps"
160:"10 million Android phones infected by all-powerful auto-rooting apps"
61:
45:
245:"Another month, another new rooting malware family for Android"
44:
claimed the
HummingBad malware was also a part of the
158:Dan Goodin - Jul 7, 2016 5:50 pm UTC (2016-07-07).
133:"HummingBad: A Persistent Mobile Chain Attack"
8:
48:family, however, these claims were refuted.
38:iOS malware, as responsible for the attack.
16:Android Malware, discovered in February 2016
179:: CS1 maint: numeric names: authors list (
124:
172:
7:
14:
1:
34:of being responsible for the
300:Goodin, Dan (7 July 2016).
347:
112:Zombie (computer science)
102:Trojan horse (computing)
224:Palo Alto Networks Blog
97:Mobile operating system
331:Cybercrime in India
87:Individual mobility
255:on 10 October 2016
77:Dendroid (Malware)
30:in February 2016.
139:. 4 February 2016
338:
310:
309:
297:
291:
290:
288:
286:
271:
265:
264:
262:
260:
251:. Archived from
241:
235:
234:
232:
231:
216:
210:
209:
207:
206:
199:Check Point Blog
191:
185:
184:
178:
170:
168:
167:
155:
149:
148:
146:
144:
129:
107:Worm (computing)
26:, discovered by
346:
345:
341:
340:
339:
337:
336:
335:
316:
315:
314:
313:
299:
298:
294:
284:
282:
273:
272:
268:
258:
256:
249:elevenpaths.com
243:
242:
238:
229:
227:
218:
217:
213:
204:
202:
193:
192:
188:
171:
165:
163:
157:
156:
152:
142:
140:
131:
130:
126:
121:
116:
57:
24:Android malware
17:
12:
11:
5:
344:
342:
334:
333:
328:
318:
317:
312:
311:
292:
281:. 11 July 2016
279:checkpoint.com
266:
236:
211:
186:
162:. Ars Technica
150:
137:checkpoint.com
123:
122:
120:
117:
115:
114:
109:
104:
99:
94:
89:
84:
79:
74:
72:Computer virus
69:
64:
58:
56:
53:
15:
13:
10:
9:
6:
4:
3:
2:
343:
332:
329:
327:
324:
323:
321:
307:
303:
296:
293:
280:
276:
270:
267:
254:
250:
246:
240:
237:
225:
221:
215:
212:
200:
196:
190:
187:
182:
176:
161:
154:
151:
138:
134:
128:
125:
118:
113:
110:
108:
105:
103:
100:
98:
95:
93:
90:
88:
85:
83:
80:
78:
75:
73:
70:
68:
65:
63:
60:
59:
54:
52:
49:
47:
43:
39:
37:
31:
29:
25:
21:
306:Ars Technica
305:
295:
283:. Retrieved
278:
269:
257:. Retrieved
253:the original
248:
239:
228:. Retrieved
226:. 2015-10-04
223:
214:
203:. Retrieved
201:. 2016-07-01
198:
189:
164:. Retrieved
153:
141:. Retrieved
136:
127:
50:
40:
32:
19:
18:
82:File binder
28:Check Point
320:Categories
230:2016-10-09
205:2016-10-09
166:2016-10-02
119:References
67:Brain Test
20:HummingBad
285:9 October
259:9 October
143:9 October
36:Yispecter
175:cite web
55:See also
326:Spyware
92:Malware
42:Lookout
62:Botnet
46:Shedun
287:2016
261:2016
181:link
145:2016
22:is
322::
304:.
277:.
247:.
222:.
197:.
177:}}
173:{{
135:.
308:.
289:.
263:.
233:.
208:.
183:)
169:.
147:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.