Hummingbad malware takes control of 10 million Android devices
Malware sells user data, generates fake ad revenue, and recruits devices for botnets
New malware dubbed Hummingbad has infected 10 million Android devices around the world, and 100,000 in the UK alone.
Hummingbad takes over smartphones' and tablets' Android operating systems, according to security firm Check Point, and can sell on users' data or generate $300,000 in fake advertising revenue each month.
Hackers can also use the malware to recruit people's devices into giant botnets that target businesses and government agencies, or sell this access on the black market, warned Check Point, which first discovered Hummingbad in February.
Additionally, the cyber criminals can sell any user data they deem valuable, such as work data stored on Android devices.
Check Point warned in its report on the malware: "Accessing these devices and their sensitive data creates a new and steady steady stream of revenue for cybercriminals. Emboldened by financial and technological independence, their skillsets will advance putting end users, enterprises, and government agencies at risk."
Hummingbad is the work of Chinese hackers, according to Check Point, and is launched alongside authentic analytics and ad platforms, targeting users in a "drive-by download attack" consisting of two components.
The first relies on an Android user browsing a site containing the malware, which attempts to take full control of the device through "root access".
If this is unsuccessful, Check Point explained, the user receives fake system update notifications that try to trick them into granting Hummingbad system-level permissions.
China has the most infected devices, at 1.60 million, while India has 1.35 million the US has 286,800 infected Android devices, and the UK around 100,000.
Check Point warned: "Without the ability to detect and stop suspicious behavior, these millions of Android devices and the data on them remain exposed today."
IT Pro has approached Google, Android's creator, for comment.
Navigating the new normal: A fast guide to remote working
A smooth transition will support operations for years to comeDownload now
Putting a spotlight on cyber security
An examination of the current cyber security landscapeDownload now
The economics of infrastructure scalability
Find the most cost-effective and least risky way to scaleDownload now
IT operations overload hinders digital transformation
Clearing the path towards a modernised system of agreementDownload now