Everything you need to know about Humming Bad Malware

<header class="content__head tonal__head tonal__head–tone-news

“>

Android malware created by a Chinese advertising company has put as many as 85m devices at risk – here’s everything you need to know about it

When researchers revealed that a Chinese advertising company had created one of the most pernicious pieces of Android malware yet, they estimated it had infected 10m Android handsets worldwide.

Dubbed “HummingBad” by researchers at the security firm Check Point, it’s a one of the biggest attacks to date on Android – the world’s most popular mobile operating system, which runs on more than 80% of all smartphones as well as tablets.

While this attack isn’t catastrophic, it opens the door for future attacks that could be, say security experts. Researchers haven’t been able to say which Android handsets are most susceptible, but say that as many as 85m of the world’s Android devices are vulnerable.

Who did this, and why?

According to a report by Check Point, the main purpose of the HummingBad malware is to trick users into clicking on mobile and web ads, which generates advertising revenue for its parent company, Yingmob – a practice known as “clickfraud”. It’s a lot like the browser toolbars designed to deliver ads to your computer a decade ago, says Dan Wiley, head of incident response for Check Point.

But HummingBad is far worse. Because the malware gains “root access” to Android – the very heart of your phone’s operating system – and then calls home to a server controlled by Yingmob, it could be used to do virtually anything the attacker wants it to do, from spying on your personal information to stealing your bank login details.

Even if the creators of the malware only use it for click fraud, they could decide to sell the rootkit on the internet’s black market, says Wiley. “It’s an extreme nuisance, with the potential to turn into a really nasty event,” he adds.

It’s like a burglar who finds a secret passage into your home, sprays graffiti on your walls and eats all the food in the fridge. Later he could come back to ransack your house and steal all your money, or share knowledge of the secret passage with someone who will.

“Rooting an Android device is not an inherently evil practice,” notes Andrew Brandt, director of threat research for security firm Blue Coat Systems. “Many people root their own phones in order to more tightly control the behavior of their mobile devices. But rooting done without the knowledge and consent of the owner of the device is an inherently hostile act.”

How did it get so bad?

Most people probably got infected because they installed a less-than-hygienic app from a third-party Android store or website, says Wiley. Check Point, he adds, did not find any of the malware-infested apps on Google Play, the primary source of Android apps for most US consumers. Other people may have visited a dodgy web site, which prompted them to install a piece of software containing a hidden payload. And once installed, the malware invited even more of its nasty friends to the party, downloading additional payloads.

The vast majority of the 10m infected handsets reside in China and India, indicating third-party app stores – which are far more popular overseas – as the most likely sources. But around 250,000 are based in the US, so could be people who are traveling from Asia to the US, or simply people who ignore Android’s default settings and allow app installs from third-party sites, Wiley explains.

Are you at risk?

A lot depends on whether you install apps from sources other than Google Play and how old your version of Android is, says Shaun Aimoto, principal software quality assurance engineer at Symantec, which sells Norton Mobile Security for Android handsets.

Older versions of Android like Jelly Bean (4.1 to 4.3) and KitKat (version 4.4.x) are at higher risk for root exploits, says Aimoto. Fortunately most of these exploits are well known and can be prevented by having up-to-date security software installed, he notes.

How do you know if you’re infected?

If your phone starts displaying unusual advertisements, or you start running out of data on your mobile plan a lot sooner than usual, then you might be infected. But odds are you won’t ever know, says Wiley.

Other telltale signs include receiving unexpected “system update” notifications, prompts to install a new app, or finding apps on your phone that you didn’t put there, and a battery that drains more rapidly than normal, adds Aimoto.

“I don’t know whether the click-fraud software can detect whether it is communicating over WiFi or a 3G/4G network,” adds Brandt, “but for those with bandwidth caps on their service, this could eat up a significant amount of your monthly bandwidth just to line the pockets of Yingmob.”

What can you do about it?

If you haven’t already installed security software on your phone, now might be a good time to consider that. Some software (like Check Point’s) can detect if a rootkit is present on the machine and alert you to it after you install, says Wiley.

How you should remove it depends on how you were infected. If you manually installed a Yingmob app – by agreeing to an install or an update of the software – you can remove it by re-setting your phone and starting from scratch.

“If you’re worried you might have something like this on your phone and you want to be entirely sure that it has been wiped, do a factory reset, then change your Google password from a computer, so that when you use the phone after the reset it will require the new credentials,” adds Brandt. “After you reconnect to Google and sync your accounts, be very, very careful about reinstalling only apps that come from trusted locations, like the legitimate Google Play Market.”

But if the malware obtained root access to your phone, a factory reset won’t be enough. You’ll have to flash a new ROM (read-only memory) on your phone – something beyond the skill set of most consumers. Your best option is to contact your mobile operator and ask them to do it for you.

How can you avoid these things in the future? “Don’t click on crazy stuff, go only to trusted stores and vendors, run some kind of threat prevention software and have a great backup of your data ready in case you need it.”

Share

0 thoughts on “Everything you need to know about Humming Bad Malware

Leave a Reply