Skip to main content

How Some Chinese Hackers Started Making Big Money




We know that Hackers hack for a variety of reasons:
...some hack to test their skills,
…some hack to gain recognition,
...some hack to make money,
...some hack to support their Nation-State strategy,
...and, some hack alone, and some hack in Groups.
And Chinese Hackers are the ones who are infamous for their dedication towards Hacking.
Chinese hacking groups are better known for attacking and stealing information, organized cyber crimes, theft of intellectual property and state-sponsored cyber espionage attacks.

But it seems that several Chinese hacker groups have now shifted their motive of hacking towards ‘making money’.

How much Money Hackers Actually Make?

It is a known fact that hacking makes money, but how much?

Answer: At least $4,500,000/year from one malware campaign.

How?
    We often observe mobile and desktop applications bundled with Ad-displaying programs, called Adware, to generate revenue.
Just last week we reported about “Kemoge Android Adware” disguising itself as popular apps, is making the rounds in as many as 20 countries.

Kemoge malware, whose origin is suspected from China, can root vulnerable Android devices, which practically allows hackers to take over victim’s Android device.

Once installed, the malware automatically download other Apps it gets paid to promote.
But Kemoge adware is not alone, the researchers have discovered some it's variants that belong to the same malware family.

Chinese Adware Family Threatening your Android

In a recent blog post, Security experts at Cheetah Mobile company, developers of CM Security and Antivirus apps, detailed about how Chinese hackers are making millions of profits from underground App distribution chains.

Other members of the same family are:

  • Ghost Push
  • Braintest
  • Guaranteed Clicks
  • RetroTetri


All these malware under same illegal Mobile Marketing Industry Chain follow a similar modus operandi; which is:

  • Repackage popular apps to injected malicious code and Ad components
  • Bypass Google Play Store’s Bouncer Security
  • Exploiting existing Android vulnerabilities to gain Admin-level permissions
  • Root users’ devices that make them unable to uninstall the virus
  • And then promote malicious apps through legitimate channels

“As users are completely unable to uninstall these malicious apps, the virus developers soon get a massive number of active users.” Cheetah Mobile researcher said.“With this user base, the virus developer is able to set up a marketing promotion company and become a mobile dealer. Then they have the qualifications to cooperate with ad sponsors, making money by distributing products for advertisers.”
These malicious apps were found on some famous App Stores, including Google Play, Aptoide and Mobogonie.
Some Critical Findings from their Research are:

  • This Virus family includes 4000 Samples
  • The Adware is affecting Android versions from 2.3 to 5.1.
  • More than 10,000 phone types and 2,742 brands have been affected.
  • The virus has affected more than 900,000 Android users in over 116 countries, especially Southeast Asia.
  • More than four suspicious domain names have been identified.

Tips for keeping your Android Device Safe
Users are advised to:

  • never click on suspicious links from emails or websites,
  • be careful what you download,
  • don’t install apps without reviewing them,
  • inspect each and every permission an Android app asks for,
  • keep your Android device updated.

Comments

Popular posts from this blog

JNTU-K B.Tech R10 All Results | Manabadi | Schools9 | jntuk.edu.in

Hi Friends...! It is some what difficult to search the all regular and supply results in google from manabadi, schools9 or from jntuk.edu.in for JNTU-Kakinada B.Tech students of R10 Regulation. So, that for this purpose Results Release team collected all the results and providing you to check the results of jntuk r10 regulation.  JNTU-K R10 B.Tech All Results [2010-14] JNTU-K R10 B.Tech All Results [2011-15] JNTU-K R10 B.Tech All Results [2012-16]

Adobe Acrobat XI Pro 11.0.0 Multilanguage (Cracked dll )

(Size: 530 MB) Adobe® Acrobat® XI Pro is more than just the leading PDF converter. It's packed with smart tools that give you even more power to communicate. Easily, seamlessly, brilliantly. NEW Edit text in a PDF - Fix a typo, change a font, or add a paragraph to your PDF as easily as you do in other applications using a new point-and-click interface. NEW Convert PDF files to PowerPoint - Get a head start on new projects by saving a PDF file as a fully editable PowerPoint presentation. NEW Create new PDF and web forms - Customize professional templates or design from scratch with the Adobe FormsCentral desktop app included in Acrobat XI Pro. IMPROVED Standardize routine PDF tasks - Make it easy to create PDFs consistently. Guide people through the correct series of steps with Actions. NEW Edit images in a PDF - Resize, replace, and adjust images in your PDF with no need to track down the original file or graphic.

The anatomy of anxiety

Mac OS X 10.8 Mountain Lion ISO Untouched OS download

Description I noticed that there are no complete and untouched Mountain Lion ISO images uploaded on any torrent sites. The only one available had its boot sector stripped so it could fit onto a 4.7 gb dvd. Therefore it is not bootable or very hard to boot! So here is a untouched copy of Mountain Lion in the ISO format. It will require a dual layer dvd to burn!  This iso was made by opening the golden master "InstallESD.dmg" in disk utility and converting it to a cd/dvd master. Macs use the extension ".cdr" for raw image files so I then changed it to ".iso". Now it is completely compatible to be burned with any iso image burner available! To burn on a mac in disk utility simply change the extension back to ".cdr".