Time: 2:00 p.m BST
Earn 1 CPE credit when you attend*
For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of Yingmob, a group of Chinese cyber criminals behind the HummingBad malware campaign. HummingBad is a malware Check Point discovered in February 2016 that establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional fraudulent apps.
Yingmob uses HummingBad to control 10 million devices globally and generate $300,000 per month in fraudulent ad revenue. This steady stream of cash, coupled with a focused organizational structure, proves cyber criminals can easily become financially self-sufficient.
Emboldened by this independence, Yingmob and groups like it can focus on honing their skill sets to take malware campaigns in entirely new directions, a trend Check Point researchers believe will escalate. For example, groups can pool device resources to create powerful botnets, they can create databases of devices to conduct highly-targeted attacks, or they can build new streams of revenue by selling access to devices under their control to the highest bidder.
Without the ability to detect and stop suspicious behavior, millions of Android devices and the data on them remain exposed.
Join NTT Com Security and Check Point Software Technologies for this webinar and you will learn
- What were some of the findings from the research team
- What is the risk to organisations from Hummingbad and similar Malware campaigns
- Are these types of attacks becoming the most common form of mobile threat
- How can organisations protect themselves