Skip to main content

HummingWhale Android Malware Discovered

A newly discovered version of the HummingBad Android malware known as HummingWhale has been identified.
Report a cyber attack: call 0300 303 5222 or email [email protected]

This content has been archived

This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk

Summary

A newly discovered version of the HummingBad Android malware known as HummingWhale has been identified.

Affected platforms

The following platforms are known to be affected:

Threat details

The new infection has been found in 46 new applications, 20 of which made it through to the official Play Store, passing Google’s security checks. The distribution of HummingWhale has mainly been through counterfeit apps in the Google Play Store, although it has also been spread through third-party stores. All of these applications have been uploaded using various fake Chinese developer names. Check Point researchers found that the rogue apps were mainly connected to camera features, but some were connected to other activities such as gaming, music and adult content.

The malware operates via a connections with remote Command & Control servers to display unwanted ads to its victims. When users try and close the ad it prompts the malware to open a virtual machine and installs the advertised app inside it using a clever algorithm to keep generating a multitude of adverts. This way, threat actors are able to earn revenue and install as many apps on infected devices without overwhelming the device's application list due to it being on the VMware. In addition, the VM component of the variant also makes it harder for security apps to spot HummingWhale's malicious behaviour and for Google's security checks to detect malicious apps before they reach the Play Store.

Furthermore and unlike its predecessor, HummingWhale has gained the ability to post reviews and ratings on the Google Play Store on behalf of infected users, a tactic used to earn extra revenue or give a boost to other malicious apps. This type of activity was first spotted with malware families such as Gooligan or CallJam and was not something native to the original HummingBad malware code.


Remediation steps

Type Step
The recommendations suggested previously in Issue 2017-01-18 regarding the HummingBad malware also apply here. Corporate users who start to experience unexpected "system update" notifications, prompts to install new apps, find apps on their device that they did not download or notice a battery that drains more rapidly than normal should turn their device off and report this to their IT security department immediately. It is recommended that the device is quarantined in order to investigate whether it has been rooted by HummingWhale or other similar auto-rooting malware.

Last edited: 17 February 2020 11:32 am