Casa > Cyber ​​Notizie > Hide and Seek Iot Botnet Now Set Against Android Devices

Hide and Seek Iot botnet ora impostato contro i dispositivi Android

The Hide and Seek IoT botnet è stato recentemente aggiornato dai suoi creatori per ora indirizzare i dispositivi Android, così. L'analisi di sicurezza rivela che l'appena rilasciata è ancora più pericoloso di prima. Our article sums up the changes and new damage potential.

Аndroid Devices at Risk of Hide and Seek Iot Botnet Attacks

The Hide and Seek IoT botnet has been updated to act against Android devices. The criminal collective behind its development has been observed to add new functionality in frequent incremental optimizations to the main engine. The Android infections seem to be caused not by targeting certain vulnerabilities, instead focusing on abuse of the Android Debug Bridge (ADB) opzione. By default this is turned off however in some cases users may want to turn it on.

The new botnet samples focus on the devices that have set the ADB option on either by default or by the users. When this function is enabled the devices are exposed as this will open a network port accessing remote connections. Malicious operators have been spotted to perform unauthenticated login attempts — using either default passwords or brute forcing the devices.

Story correlati: Hide ‘N Seek IoT Botnet Aggiornato con i meccanismi di infezione Database

The Hide and Seek IoT botnet has been spotted to have added about 40 000 devices to its arsenal, the infected devices are mostly from China, Korea and Taiwan. Many Android devices are now part of the home infrastructure — phones, compresse, TVs and other peripherals. This is the reason why attacks using it are very regarded as critical.

The attacks also lead to the conclusion that the criminal collective behind the botnet is constantly working to update its features. The vastly increased number of infected devices is evident that the botnet is gaining momentum. Botnets are effective for launching distributed denial-of-service attacks (DDoS) which can render sites and computer networks non-working.

Obtaining access to the devices also means tat the hackers can induce various damaging effects upon them such as the following:

  • Sorveglianza — The criminals behind the botnet can spy on the victims in real time and take over control of their devices if such components are added.
  • Virus Deployment — Malware infections can be done by the remote network intrusions. In the case of mobile devices this can include miners, Trojan, adware viruses and etc.
  • furto di informazioni — As remote access allows the criminals access to the contained within data the hackers may obtain any data from them.

We expect that further Hide and Seek IoT botnet intrusion attempts will be initiated in the near future.


Martin Beltov

Martin si è laureato con una laurea in Pubblicazione da Università di Sofia. Come un appassionato di sicurezza informatica si diletta a scrivere sulle ultime minacce e meccanismi di intrusione.

Altri messaggi


Lascio un commento

Il tuo indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *

Condividi su Facebook Quota
Loading ...
Condividi su Twitter Tweet
Loading ...
Condividi su Google Plus Quota
Loading ...
Condividi su Linkedin Quota
Loading ...
Condividi su Digg Quota
Condividi su Reddit Quota
Loading ...
Condividi su Stumbleupon Quota
Loading ...