Posted on 07/07/2016 10:43:22 PM PDT by Utilizer
A malicious, criminal division of an otherwise legitimate Chinese tech company is behind a mobile malware distribution campaign that currently generates around US$300,000 a month, according to security researchers.
Check Point this week published an in-depth threat analysis [pdf] following a five-month investigation into malware dubbed HummingBad, which was originally discovered in February.
It is known to root Android devices, primarily for the purpose of generating revenue through fake ad clicks and fraudulent app installations.
Check Point claims that Yingmob, a Chinese mobile ad server and analytics business, is developing and distributing the malware through a special corporate division of 25 employees known as its Development Team for Overseas Platform. Yingmob's more benign operations allegedly shares its ample technology and resources with this malicious department.
(Excerpt) Read more at itnews.com.au ...
an otherwise legitimate Chinese tech companyNo such thing. They all serve the Party.
bflr
$300,000 a month for fake clicks.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.