SEE: BYOD (Bring Your Own Device) Policy (Tech Pro Research)If the numbers are accurate, the Hummer trojan family could be one of the biggest ever. The 3 big takeaways for TechRepublic readersThe mobile trojan family Hummer could be one of the largest ever, with the number of infected devices hitting 1.2 million.Hummer roots an Android device He covers startups and enterprise technology and is passionate about the convergence of tech and culture. Powered by Livefyre Add your Comment Editor's Picks Inside Amazon's clickworker platform: How half a million people are paid pennies to train AI How K9s became a secret weapon for solving
Hummer is thought to have originated in China relative to underground industry there, based on an email address linked to the domains used, and it saw 63,000 daily infections in China All rights reserved. VirusPCs infectedThreat Level 1 Virtumonde0.03% 2 AdsRevenue0.03% 3 Conficker.C0.02% 4 MaliciousP0.02% 5 Xor-encoded.A0.02% 6 Downloader.MDW0.01% 7 Lineage.KMF0.01% 8 Lineage.BZE0.01% 9 HideWindow.S0.01% 10 Adware/OneStep0.01% 1 2 3 4 5 Next» 1 Perhaps the most astonishing information were the results of Cheetah Mobile's test on the Hummer trojan. "In several hours, the trojan accessed the network over 10,000 times and downloaded over 200 https://en.wikipedia.org/wiki/Trojan_horse_(computing)
He covers startups and enterprise technology and is passionate about the convergence of tech and culture. Threat Type 1 RedCrossAntivirusAdware 2 PeakProtection2010Adware 3 SecurityTool2010Adware 4 NetWorkControlAdware 5 DefenseCenterAdware 6 AVSecuritySuiteAdware 7 SysinternalsAntivirusAdware 8 SpywareCleaner2010Adware 9 SecurityMasterAVAdware 10 RSTAntivirus2010Adware1 2 Next» 1 - 10 of 11 resultsThe Even if a user uninstalls these apps, the trojan will reinstall them.
Full Bio Contact Disclosure See all of Conner's content Google+ connerforrest × Disclosure Conner Forrest has nothing to disclose. That's bad news for Android users, but it means big bucks for the bad guys. While the total number of new infections is dropping off, the average number of infected devices is 1,190,000—a larger number than any other mobile phone trojan. Malware Definition In a few hours, it accessed the network more than 10,000 times and used 2GB of network data.Hummer cannot be removed even by factory resetting a device.
For starters, it will root the phone (basically unlocking the OS) to gain admin privileges. Trojan Horse Virus Download Image: Cheetah Mobile More about IT Security Gallery: The 10 biggest business hacks of 2016 Experts predict 2017's biggest cybersecurity threats Electronics-sniffing dogs: How K9s became a secret weapon for solving Subscribe Also see Android Security Update May 2016: What you need to know (TechRepublic)LizardStresser botnet targets IoT devices to launch 400Gbps attacks (ZDNet)10 do's and don'ts for securing your Android device He doesn't hold investments in the technology companies he covers. × Full Bio Conner Forrest is News Editor for TechRepublic.
PRODUCTS For Home For Business Premium Services Refund Policy DOWNLOADS Homeusers Enterprise PARTNERS Distributors Affiliates COMPANYAbout Panda SecurityTechnology Reviews Job Offers & Internships Worldwide Support to innovation BLOG SUPPORT © Panda https://www.symantec.com/security_response/writeup.jsp?docid=2011-082216-3542-99&tabid=2 By Conner Forrest | June 30, 2016, 6:21 AM PST RSS Comments Facebook Linkedin Twitter More Email Print Reddit Delicious Digg Pinterest Stumbleupon Google Plus Image: iStockphoto/KrulUA Security researchers at Cheetah Trojan Horse Virus The top five most-affected countries, by number of infections, were as follows:India - 154,248Indonesia - 92,889Turkey - 63,906China - 63,285Mexico - 59,192SEE: Three important security upgrades to Android N (TechRepublic)The latest Trojan Virus Removal Cheetah Mobile's Killer app supposedly will remove the trojan, or users can flash their phone to remove it.
Cheetah Mobile claims its trojan Killer app will remove Hummer, or users flash their device to get rid of it as well. Latest Threats Most Active Viruses Hoaxes Spyware Threat Type Threat level 1 Bifrose.KVBackdoor2 Nimrod.BWorm3 KittyKat.ATrojan4 Hoots.AWorm5 MS06-020Vulnerability6 MS06-019Vulnerability7 MS06-018Vulnerability8 Nabload.CWTrojan9 Downloader.ITWTrojan10 Banker.CTDTrojan1 2 Next» 1 - 10 of 19 results Threat Type 1 Gaobot.EVM.WormHoax 2 Sinowal.EVMHoax 3 ICE hoaxHoax 4 Athens2004Hoax 5 Llamadas PerdidasHoax 6 Frog and Fish warningsHoax 7 Bonsai KittensHoax 8 Girls of PlayboyHoax 9 WTC SurvivorHoax 10 Hotmail Get the latest news on the biggest threats, subscribe to our Information Security newsletter. Trojan Horse Virus Example