NetQin denies claims that it uploads malware with its antivirus software

Antivirus maker first addressed fraudulent practices in its IPO statement on March 15

NetQin Mobile on Friday denied reports that claimed it had deliberately installed viruses on customers' mobile phones along with its antivirus software and then charged customers to remove the malware.

NetQin's denial follows a written rebuttal in its initial public offering prospectus with the U.S. Securities and Exchange Commission dated March 15 that referred to a China State TV report of "uploading virus to imported mobile phones to promote our mobile security products by Beijing Feiliu," a company in which NetQin holds a 33 per cent interest.

NetQin, a Beijing-based mobile security software maker, hosted a booth at International CTIA Wireless in Orlando this week, and announced its NetQin Mobile Anti-virus 4.0 Beta for BlackBerry on Tuesday.

Reports circulated on the Internet the following day citing the earlier Chinese State TV report describing the alleged malware scheme. Various Web sites, including reported that NetQin's customers would allegedly load the NetQin antivirus software, then get an alert informing them that they needed an update to fix the problem, for which they would be charged about 30 cents. also said the Netqin software removed other antivirus software on the phones. Also, said China's three wireless network providers blocked sales of the NetQin software from their app stores.

NetQin issued a formal denial in a statement on Friday saying: "The allegations waged against us are entirely false," and encouraged any independent third party to evaluate and audit its products. "We are confident they will be found to be safe, secure and of high quality," the NetQin statement said.

In an e-mail, a publicist hired by NetQin, Sean Angus from Spark PR, said the allegations were surprising and were "set up by a competitor and are completely false."

In a telephone interview, NetQin spokeswoman Elena Lau, said NetQin's antivirus software had never been sold by the three China-based carriers in their app stores. She said that NetQin had no comment on whether a competitor fabricated the false stories.

"This is a non-event," Lau added, and said she could not comment beyond the statement because NetQin is in a silent period, since it has filed its IPO prospectus to list its shares on the New York Stock Exchange.

SEC records show that NetQin filed for its IPO on March 15 to use the ticker symbol "NQ," and listed Piper Jaffray as the lead underwriter. Net revenues at NetQin were $4 million in 2008, $5.3 million in 2009 and $17.7 million in 2010, according to its IPO report.

NetQin offers mobile security products as well as mobile productivity and intelligent cloud services, primarily for smartphone users. About 35 per cent of NetQin's revenues in 2010 came from subscribers outside of China. Frost & Sullivan has reported that NetQin had 67 per cent of China's mobile security market at the end of 2010.

NetQin started in 2005 in Beijing and established a presence in the U.S. in November 2010.

The 161-page IPO prospectus written by NetQin notes on page 17 that China Central Television (CCTV) ran a report on March 15 of complaints of fraudulent practices against NetQin. One practice named in the TV report was the uploading of viruses to imported mobile phones to promote NetQin's security products.

The uploading of viruses was reported to have been done by Beijing Feiliu, a company one-third owned by Netqin, but NetQin said in the prospectus it does not believe it has committed any wrongdoing and would publicly explain its practices.

However, NetQin further said in the prospectus that because CCTV "has wide coverage and perceived authority, such negative publicity has adversely and severely damaged our brand, public image and reputation, which may seriously harm our ability to attract and retain users and result in material adverse impact on our results of operations and prospect."

One security Web site, reported more details about the connections between Beijing Feiliu and NetQin, including claims that NetQin does remove the Feiliu app for a small fee.

One analyst, Jack Gold of J. Gold Associates, said in an interview that NetQin had not specifically said in its statement this week or in the prospectus that it never uploaded malware, directly or indirectly, with its legitimate software.

"Maybe I am getting too skeptical in my old age, but NetQin didn't actually say that they didn't load a malware stub on the product and then make people pay to get it removed."

He said it would be interesting to hear Research in Motion's reaction to the antivirus software for BlackBerry announced by NetQin this week. RIM did not respond to a request to comment.

Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen or subscribe to Matt's RSS feed . His e-mail address is .

Read more about mobile and wireless in Computerworld's Mobile and Wireless Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Gov't Legislation/Regulationtelecommunicationconsumer electronicsMobile and WirelessMobile Apps and ServicesregulationsmartphonesPhonesmobilegovernment

More about BlackBerryCTIACTVetworkMotionResearch In MotionSECSecurities and Exchange CommissionTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Matt Hamblen

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place