A new IOT botnet is infecting Android-based set-top boxes

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
New Ares IoT malware/botnet has been seen on HiSilicon, Cubetek, and QezyMedia set-top boxes, per new report.

A new IoT botnet named Ares is infecting Android-based devices that have left a debug port exposed on the Internet.

Among this botnet's most common victims are Android set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia, cyber-security firm WootCloud said today.

ANOTHER IOT BOTNET TARGETING ADB
The attacks aren't using a vulnerability in the Android operating systems, but are exploiting a configuration service that has been left enabled and unprotected on some set-top boxes installations.

Named the Android Debug Bridge, or ADB, this is a standard feature of the Android OS. It's purpose is to allow manufacturers and app developers access to the Android OS via a command-line interface. This ADB terminal can be accessed in three ways, via a wired connection, WiFi, or over a network or the internet (via a device's port 5555).
...
...
...
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top