The BHIVE Channel Partnership Program is designed to increase the organic viewership of specified landing page via a social media distribution network to reach more people in different micro-segments. Our internal studies show an increase of interest and viewership when content is distributed via multiple micro segments.
Our program focuses on changing how content from advertisers and publishers is delivered and consumed by users. Online users treat pop-ups and banner ads the same way as ads in reality. They serve as low priority viewing because they aren’t the reason why the “user” is visiting the “site”.
The BHIVE Channel Partnership Program was designed with the launch of our own news channels and is ready for a select number of digital publishers to take advantage of. Although in beta mode, we will invite a number of digital publishers to partake in our program and see how this works for themselves. We look forward in receiving your application and working with you.
For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of Yingmob, a group of Chinese cyber criminals behind the HummingBad malware campaign. HummingBad is a malware Check Point discovered in February 2016 that establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional fraudulent apps.
Yingmob runs alongside a legitimate Chinese advertising analytics company, sharing its resources and technology. The group is highly organized with 25 employees that staff four separate groups responsible for developing HummingBad’s malicious components.
Other research firms have associated Yingmob with an iOS malware called Yispecter, but the evidence Check Point researchers found confirms the same group is also behind HummingBad: