-
Q: What type of malware is 'HummingBad'?A: An Android rootkit and adware.
-
Q: Who is attributed as the creator of HummingBad?A: Yingmob, a Chinese advertising analytics agency.
-
Q: What is the primary infection vector?A: Drive-by downloads from malicious websites.
-
Q: How does HummingBad achieve persistence?A: By attempting to root the Android device.
-
Q: What is the estimated number of infected devices mentioned?A: Over 10 million devices globally.
-
Q: What is the revenue model for HummingBad?A: Generating fraudulent ad revenue and installing fraudulent apps.
-
Q: What is 'silent installation'?A: Installing apps in the background without user consent or interaction.
-
Q: What specific component allows it to root devices?A: It carries a library of known exploits (e.g., Framaroot) to try against the device.
-
Q: How does it handle 'Command and Control' (C2)?A: It communicates with C2 servers to receive tasks and upload device data.
-
Q: What is the significance of the 'right_core' component?A: It is the main malicious payload that decrypts and executes other modules.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.