pdf

HummingBad Malware_CC_1000.pdf

Hummingbad Malware Cc 1000

Analysis of the HummingBad Android malware campaign.

This page contains AI generated content. Errors or omissions may be present. Use human level critical thinking.
  • Q: What type of malware is 'HummingBad'?
    A: An Android rootkit and adware.
  • Q: Who is attributed as the creator of HummingBad?
    A: Yingmob, a Chinese advertising analytics agency.
  • Q: What is the primary infection vector?
    A: Drive-by downloads from malicious websites.
  • Q: How does HummingBad achieve persistence?
    A: By attempting to root the Android device.
  • Q: What is the estimated number of infected devices mentioned?
    A: Over 10 million devices globally.
  • Q: What is the revenue model for HummingBad?
    A: Generating fraudulent ad revenue and installing fraudulent apps.
  • Q: What is 'silent installation'?
    A: Installing apps in the background without user consent or interaction.
  • Q: What specific component allows it to root devices?
    A: It carries a library of known exploits (e.g., Framaroot) to try against the device.
  • Q: How does it handle 'Command and Control' (C2)?
    A: It communicates with C2 servers to receive tasks and upload device data.
  • Q: What is the significance of the 'right_core' component?
    A: It is the main malicious payload that decrypts and executes other modules.

Ask a question

Have a doubt or need clarification?



I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.

Thank you!

I have received your message and I shall get back to you shortly.