A new sophisticated malware targeting android users has been found by researchers at Check Point Software Technologies Ltd.
HummingBad operates alongside legitimate advertising business mainly through drive-by downloads, when users access certain websites. Once infected, the malware will attempt to root the device in order to gain full access. Even if rooting is unsuccessful, HummingBad proceeds to download a vast number of fraudulent apps. Malicious components are simply triggered through booting the device,turning the screen on or off, user detection and changes in connectivity. Checkpoint has traced the origins of HummingBad to a Chinese mobile ad server company known as Yingmob.

Although HummingBad is currently used for financial gain, there is the added danger that cyber criminals are able to use infected devices to create powerful botnets to carry out targeted attacks on businesses or government agencies.

Read full Analysis here: https://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Resear...