{"id":15151,"date":"2016-07-26T07:38:17","date_gmt":"2016-07-26T07:38:17","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5809"},"modified":"2020-02-26T11:10:22","modified_gmt":"2020-02-26T16:10:22","slug":"hummer-trojan","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hummer-trojan\/15151\/","title":{"rendered":"Hummer: An unexpected aspect of the rootkit"},"content":{"rendered":"<p>As you know there are great lots of cyber threats, all of them harmful in different ways. Financial kinds of malware are the most tangible for \u201cend users\u201d (if victims may be called that way). Firstly, they directly \u201cpick pockets\u201d, and secondly, banks get affected by them, too, not just customers suffer. But should we pay less attention to the other kinds of malware? We believe we must not.<\/p>\n<p>For example, the Hummer Trojan has recently <a href=\"http:\/\/www.theregister.co.uk\/2016\/06\/29\/hackers_give_android_a_hummer_to_root_phones_and_slurp_up_smut_apps\/\" target=\"_blank\" rel=\"noopener nofollow\">hit the headlines<\/a> quite often. Actually it has nothing in common with financial malware. Hummer\u2019s authors make money by installing unwanted applications and displaying ads. The question is what is the danger for the banks here.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Hummer: An unexpected aspect of the rootkit. #fraud #trojan<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F9NYr&amp;text=Hummer%3A+An+unexpected+aspect+of+the+rootkit.+%23fraud+%23trojan\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Actually the key danger is the method the Hummer uses to achieve its goals. It roots a device and gains administrator\u2019s privileges to install unauthorized software of its own discretion. Thus it gets unlimited access to the operating system with an opportunity to bypass additional security measures, to substitute legitimate applications for the fake ones, to make malicious changes to the installed programs. All that happens absolutely without the user\u2019s knowledge.<\/p>\n<p>The situation is complicated by the fact that the notorious Hummer has many ways of rooting and is very hard to get rid of. And it is not easy to detect if it infected a mobile device prior to the installation of a security solution. The rooted phone becomes vulnerable to multiple threats, not necessarily directly related to the Hummer Trojan. And attackers would surely take advantage of this vulnerability including attempts to access users\u2019 bank accounts.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Hummer\u00a0roots a device and gains administrator\u2019s privileges to install unauthorized software of its own discretion.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F9NYr&amp;text=Hummer%C2%A0roots+a+device+and+gains+administrator%26%238217%3Bs+privileges+to+install+unauthorized+software+of+its+own+discretion.+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Of course, our solutions successfully detect and prevent any attempts of infection by various modifications of this Trojan \u2013 in case they are installed on the client\u2019s mobile device. But banks had better act themselves and protect their own mobile apps by means of Kaspersky Lab\u2019s technologies. Kaspersky Fraud Prevention for Mobile solution provides any banking application with a broad set of protection mechanisms that prevent the loss of funds even if the Hummer has already rooted the device. Firstly, KFP reveals installations of strange unwanted programs, and secondly it notifies the bank security system of a user with the infected device.<\/p>\n<p>More details on Kaspersky Fraud Prevention <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/fraud-prevention?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The key danger is the method the Hummer uses to achieve its goals. It roots a device and gains administrator\u2019s privileges to install unauthorized software of its own discretion<\/p>\n","protected":false},"author":2354,"featured_media":15370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[80,2446,2447,409,723],"class_list":{"0":"post-15151","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-fraud","10":"tag-hummer","11":"tag-prevention","12":"tag-rooting","13":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hummer-trojan\/15151\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hummer-trojan\/3925\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hummer-trojan\/15151\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hummer-trojan\/15151\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2354"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15151"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15151\/revisions"}],"predecessor-version":[{"id":33719,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15151\/revisions\/33719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15370"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}