A Chinese hacking group is making $500,000 per day, know how

Based on Cheetah Mobile’s estimation, if the virus developer were able to make $0.50, the average cost of getting new installation, every time the virus installed an application on a smartphone, the group behind this Hummer Trojan family would be able to make over $500,000 daily.

Since RFID tags work by broadcasting information to electronic RFID readers, security breaches can occur if hackers eavesdrop on this conversation, and manage to gain access to or tamper with information.
Since RFID tags work by broadcasting information to electronic RFID readers, security breaches can occur if hackers eavesdrop on this conversation, and manage to gain access to or tamper with information.

Based on Cheetah Mobile’s estimation, if the virus developer were able to make $0.50, the average cost of getting new installation, every time the virus installed an application on a smartphone, the group behind this Hummer Trojan family would be able to make over $500,000 daily.

On June 29th, Cheetah Mobile Security Research Lab issued warnings against a newly found mobile phone Trojan family, which has been dubbed “Hummer.” During the first half of 2016, the Hummer Trojan infected nearly 1.4 million devices daily at its peak. In China alone, there were up to 63,000 infections every day. According to collected evidence, this Trojan family has something to do with the underground industry chain in China, said Cheetah Mobile.

Security researchers claim that this Trojan family is one of the largest ever, with millions of Android phones infected around the world. According to Cheetah Mobile’s estimation, if the virus developer were able to make $0.50 (the average cost of getting new installation) every time the virus installed an application on a smartphone, the group behind this Trojan family would be able to make over $500,000 daily.

Basically, when a mobile phone is infected with the Hummer Trojan, it will root the device to obtain administrator privileges of the system. It will then frequently pop up ads and silently install unnecessary or unwanted applications (even malware) in the background, which consumes a lot of network traffic. Since the Hummer Trojan can gain the highest control over the phone system, ordinary anti-virus tools are not able to clear the Trojan thoroughly – even performing a factory reset on the device won’t get rid of it.

Cheetah Mobile claimed that it had updated its anti-virus products, CM Security and Clean Master, to ensure users won’t be affected by Hummer.

Tracing the source

Cheetah Mobile said that after analysing the samples, they discovered that from the beginning of 2016, the group started using 12 domain names to update the Trojan and issue promotion orders.

Through the Whois history information, researchers found that several of the domains are linked to an e-mail account in mainland China. The researchers believe that this Trojan family originated from the underground internet industry chain in China, based on the Trojan codes that have been uploaded to an open-source platform by a careless member of the criminal group.

Large number of phone infected

Between January and June 2016, the average number of Hummer-infected phones is 1,190,000, which is larger than any other mobile phone Trojan. And, this is now spreading throughout the world. India, Indonesia, Turkey, and China have seen the largest number of infections.

1India154248
2Indonesia92889
3Turkey63906
4China63285
5Mexico59192
6The Philippines55290
7Russia51261
8Malaysia38141
9Thailand34601
10Vietnam29469
11Columbia28685
12Ukraine26785
13Iran26116
14Egypt22308
15Romania19709
16America18787
17Iraq15622
18Algeria12691
19Bangladesh12082
20Pakistan11957
21Spain11671
22Venezuela10574
23Italy10124
24Germany9447
25Nigeria8028

Since India has the most Hummer Trojan infections. Among the top 10 Trojans affecting most users in India, the second and third are members of the Hummer Trojan family, and the sixth is a Trojan that’s promoted by Hummer.

Android.RISKWARE.Hideicon.lv
2Android.MALWARE.at_PermAd.a
3Android.MALWARE.at_Fakegupdt.f
4Android.Troj.guerrilla.mc
5Android.Troj.at_Downloader.q
6Android.Troj.Sprovider.a
7Android.RISKWARE.SmsSend.ba
8Android.Troj.tk_guerrilla.c
9Android.Troj.at_CovaDown.d
10Android.RISKWARE.at_Parse.a

The Hummer Trojan family members are embedded with a root module, and the latest variant has as many as 18 different root methods. Again, once a phone is infected, the Trojan gains root privilege, which makes it very difficult to delete.

This Trojan continually pops up ads on victims’ phones, which is extremely annoying. It also pushes mobile phone games and silently installs porn applications in the background. Unwanted apps appear on these devices, and they’re reinstalled shortly after users uninstall them.

Cheetah Mobile Security Research Lab said that they made a test with the Hummer Trojan, and the findings were astonishing: In several hours, the Trojan accessed the network over 10,000 times and downloaded over 200 APKs, consuming 2 GB of network traffic.

Get live Share Market updates, Stock Market Quotes, and the latest India News and business news on Financial Express. Download the Financial Express App for the latest finance news.

This article was first uploaded on July one, twenty sixteen, at forty-one minutes past three in the afternoon.
Market Data
Market Data