Monday, July 9, 2018
Home
Unlabelled
Monero Mining Malware Infecting Android Smart TVs & Smartphones
Monero Mining Malware Infecting Android Smart TVs & Smartphones
The malicious Monero mining campaign is spreading fast through ADB.miner to target Android devices.
The IT security researchers at a Chinese information security firm
Netlab have revealed that the ADB.miner malware also called
Android.CoinMine.15 is spreading at an excessively fast pace.
Researchers have noted that its activity is at its peak at the moment
with the number of infected devices getting doubled every passing day.
According to their blog post, a majority of these infected devices
are smart TVs probably because these devices use ADB (Android Debug
Bridge) for uninterrupted internet connections. However, smartphones,
set-top boxes, media players, routers, tablets and receivers along with
the Android-based single-board computer Raspberry Pi 3 are also
potential targets since all of them use network debugging.
This Android Trojan performs Monero cryptocurrency mining and can
easily infect other devices; it infects Android devices using an open
port 5555 that is used by the ADB. It is distributed via the
Droidbot.apk application with the files nohup, sss, and bot.dat, which
are installed on an infected host through another infected device.
The sss file is executed using the nohup utility where the file
serves as a daemon and extracts other Trojan components from bot.dat.
These components include a JSON configuration file, a copy of the
droidbot Trojan program and miner applications both for 32-bit and
64-bit operating systems. After being launched, droidbot produces a
random IP address and attempts to create a connection with the port 5555
through creating an infinite loop, which infects the
targeted device by exploiting the ADB debugger’s interface.
Additionally, a separate thread is created where a miner application
is launched; this application is designed to mine Monero cryptocurrency.
Through mining operation, the device’s performance is significantly
reduced as it will get overheated and the battery will be drained
rapidly.
It must be noted that the ADB debugger is originally disabled in a
majority of Android devices but some vendors choose to enable it; it can
also be enabled manually by a user and developers also use the
debugging mode frequently. Around 8% of the devices have the debugging
mode enabled; this means 8% of all the android devices are potentially
at risk.
After getting infected, the compromised TV boxes and Android
smartphones search networks for other devices having the Internet port
5555 open, which usually is closed but the ADB tool enables it to carry
out a series of diagnostic tests. Netlab’s laboratory was scanned by
2,750 unique IPs in the initial 24 hours after the botnet was launched.
This is why researchers believe that the malware is spreading at an
alarmingly high rate.
“Overall, we think there is a new and active worm targeting Android
systems’ ADB debug interface spreading, and this worm has probably
infected more than 5,000 devices in just 24 hours. Those infected
devices are actively trying to spread malicious code,” wrote the
researchers from Netlab.
Subscribe to:
Post Comments (Atom)
Post Top Ad
Author Details
a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
No comments:
Post a Comment