How a Chinese hacking group is making $500,000 per day

Based on Cheetah Mobile’s estimation, if the virus developer were able to make $0.50, the average cost of getting new installation, every time the virus installed an application on a smartphone, the group behind this Hummer Trojan family would be able to make over $500,000 daily.

On June 29th, Cheetah Mobile Security Research Lab issued warnings against a newly found mobile phone Trojan family, which has been dubbed “Hummer.” During the first half of 2016, the Hummer Trojan infected nearly 1.4 million devices daily at its peak. In China alone, there were up to 63,000 infections every day. According to collected evidence, this Trojan family has something to do with the underground industry chain in China, said  Cheetah Mobile.

Security researchers claim that this Trojan family is one of the largest ever, with millions of Android phones infected around the world. According to Cheetah Mobile’s estimation, if the virus developer were able to make $0.50 (the average cost of getting new installation) every time the virus installed an application on a smartphone, the group behind this Trojan family would be able to make over $500,000 daily.

Basically, when a mobile phone is infected with the Hummer Trojan, it will root the device to obtain administrator privileges of the system. It will then frequently pop up ads and silently install unnecessary or unwanted applications (even malware) in the background, which consumes a lot of network traffic. Since the Hummer Trojan can gain the highest control over the phone system, ordinary anti-virus tools are not able to clear the Trojan thoroughly – even performing a factory reset on the device won’t get rid of it.

Cheetah Mobile claimed that it had updated its anti-virus products, CM Security and Clean Master, to ensure users won’t be affected by Hummer.

Tracing the source
Cheetah Mobile said that after analysing the samples, they discovered that from the beginning of 2016, the group started using 12 domain names to update the Trojan and issue promotion orders.

Through the Whois history information, researchers found that several of the domains are linked to an e-mail account in mainland China. The researchers believe that this Trojan family originated from the underground internet industry chain in China, based on the Trojan codes that have been uploaded to an open-source platform by a careless member of the criminal group.

Large number of phone infected
Between January and June 2016, the average number of Hummer-infected phones is 1,190,000, which is larger than any other mobile phone Trojan. And, this is now spreading throughout the world. India, Indonesia, Turkey, and China have seen the largest number of infections.

Since India has the most Hummer Trojan infections. Among the top 10 Trojans affecting most users in India, the second and third are members of the Hummer Trojan family, and the sixth is a Trojan that’s promoted by Hummer.

The Hummer Trojan family members are embedded with a root module, and the latest variant has as many as 18 different root methods. Again, once a phone is infected, the Trojan gains root privilege, which makes it very difficult to delete.

This Trojan continually pops up ads on victims’ phones, which is extremely annoying. It also pushes mobile phone games and silently installs porn applications in the background. Unwanted apps appear on these devices, and they’re reinstalled shortly after users uninstall them.

Cheetah Mobile Security Research Lab said that they made a test with the Hummer Trojan, and the findings were astonishing: In several hours, the Trojan accessed the network over 10,000 times and downloaded over 200 APKs, consuming 2 GB of network traffic.

cheetah mobileCheetah Mobile Security Research LabChinese hacking groupCybersecurityMobile Hackingsmartphonetechnology
Comments (0)
Add Comment