Hide and Seek IoT Botnet Now Spreads to New Android Devices Using ADB over Wi-Fi
#1
Quote:The Hide and Seek IoT botnet has added a new feature to its arsenal: it is now capable of infecting new Android-based devices via a Wi-Fi connection using an Android Debug Bridge (ADB) security flaw as discovered by Bitdefender Labs.

As reported by Bitdefender Labs, the new Hide and Seek variant is capable of recruiting new bots in the network by exploiting the Android Debug Bridge (ADB) feature used for troubleshooting by Android developers. Although not all Android devices come with ADB toggled on by default, some Android vendors decide to leave it enabled providing a simple to exploit attack vector using Wi-Fi ADB remote connections through the 5555. Connecting to an Android system where ADB is enabled by default allows attackers to get shell access as root, giving them the possibility to run and install anything on the compromised device with full admin privileges.

Source: https://news.softpedia.com/news/hide-and...3121.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Mullvad retires OpenVPN support on deskt...
OpenVPN gets the a...harlan4096 — 09:32
AdGuard VPN for Mac 2.8.2
AdGuard VPN for Ma...harlan4096 — 09:30
AMD FSR Redstone launched: ML-based Ups...
FSR Redstone’s ML Fr...harlan4096 — 09:29
(PC Game - Epic) Hogwarts Legacy (Dec 12...
  Hogwarts Legacy ...Mehdi — 18:56
AdGuard for Android 4.12.2
AdGuard for Androi...harlan4096 — 09:01

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (43)ivyhuv

[-]
Online Staff
There are no staff members currently online.

>