- Jul 22, 2014
- 2,525
New Ares IoT malware/botnet has been seen on HiSilicon, Cubetek, and QezyMedia set-top boxes, per new report.
A new IoT botnet named Ares is infecting Android-based devices that have left a debug port exposed on the Internet.
Among this botnet's most common victims are Android set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia, cyber-security firm WootCloud said today.
ANOTHER IOT BOTNET TARGETING ADB
The attacks aren't using a vulnerability in the Android operating systems, but are exploiting a configuration service that has been left enabled and unprotected on some set-top boxes installations.
Named the Android Debug Bridge, or ADB, this is a standard feature of the Android OS. It's purpose is to allow manufacturers and app developers access to the Android OS via a command-line interface. This ADB terminal can be accessed in three ways, via a wired connection, WiFi, or over a network or the internet (via a device's port 5555).
...
...
...
A new IoT botnet named Ares is infecting Android-based devices that have left a debug port exposed on the Internet.
Among this botnet's most common victims are Android set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia, cyber-security firm WootCloud said today.
ANOTHER IOT BOTNET TARGETING ADB
The attacks aren't using a vulnerability in the Android operating systems, but are exploiting a configuration service that has been left enabled and unprotected on some set-top boxes installations.
Named the Android Debug Bridge, or ADB, this is a standard feature of the Android OS. It's purpose is to allow manufacturers and app developers access to the Android OS via a command-line interface. This ADB terminal can be accessed in three ways, via a wired connection, WiFi, or over a network or the internet (via a device's port 5555).
...
...
...