• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Beware: New Matryosh DDoS Botnet Targeting Android-Based Devices

You are here: Home / General Cyber Security News / Beware: New Matryosh DDoS Botnet Targeting Android-Based Devices

A nascent malware marketing campaign has been spotted co-opting Android equipment into a botnet with the key function of carrying out distributed denial-of-services (DDoS) attacks.

Named “Matryosh” by Qihoo 360’s Netlab scientists, the most current risk has been discovered reusing the Mirai botnet framework and propagates by uncovered Android Debug Bridge (ADB) interfaces to infect Android equipment and ensnare them into its network.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Premium Security 2021

Protect yourself against all threads using AVAST Premium Security. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium.

Get AVAST Premium Security with 60% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ADB is a command-line instrument section of the Android SDK that handles communications and will allow developers to install and debug applications on Android equipment.

Although this alternative is turned off by default on most Android smartphones and tablets, some sellers ship with this element enabled, consequently making it possible for unauthenticated attackers to hook up remotely by way of the 5555 TCP port and open up the devices right to exploitation.

password auditor

This is not the first time a botnet has taken gain of ADB to infect susceptible products.

In July 2018, open ADB ports were utilised to spread several Satori botnet variants, which include Fbot, and a calendar year later on, a new cryptocurrency-mining botnet malware was discovered, building inroads using the same interface to target Android system users in Korea, Taiwan, Hong Kong, and China.

But what makes Matryosh stand out is its use of Tor to mask its malicious exercise and funnel instructions from an attacker-controlled server by means of the network.

“The system of acquiring C2 are nested in layers, like Russian nesting dolls,” Netlab researchers claimed.

To attain this, Matryosh initial decrypts the distant hostname and utilizes the DNS TXT request — a kind of source record — to acquire TOR C2 and TOR proxy. Subsequently, it establishes a link with the TOR proxy, and communicates with the TOR C2 server by the proxy, and awaits more recommendations from the server.

Netlab researchers claimed the emerging botnet’s command structure and its use of TOR C2 are remarkably very similar to that of a different botnet termed LeetHozer which is developed by the Moobot team.

“Primarily based on these factors, we speculate that Matryosh is the new get the job done of this mother or father group,” the researchers concluded.

Found this report intriguing? Observe THN on Fb, Twitter  and LinkedIn to go through extra special content material we write-up.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «Why Human Error Is #1 Cyber Security Threat To Businesses Why Human Error is #1 Cyber Security Threat to Businesses in 2021
Next Post: US Shipping Giant Loses $7.5m in Ransomware Attack Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • US Shipping Giant Loses $7.5m in Ransomware Attack
  • Beware: New Matryosh DDoS Botnet Targeting Android-Based Devices
  • Why Human Error is #1 Cyber Security Threat to Businesses in 2021
  • Google: Incomplete Patches Caused Quarter of Zero-Days in 2020
  • Critical Bugs Found in Popular Realtek Wi-Fi Module for Embedded Devices
  • TeamTNT launches cryptojacking operation on Kubnernetes clusters
  • SonicWall issues firmware patch after attackers exploited critical bugs
  • SOC teams spend nearly a quarter of their day handling suspicious emails
  • Emotet’s Takedown: Have We Seen the Last of the Malware?
  • Second SolarWinds Attack Group Breaks into USDA Payroll — Report

Copyright © TheCyberSecurity.News, All Rights Reserved.