Trend Micro recently discovered an Android crypto-currency mining botnet that can spread via open ADB (Android Debug Bridge) ports and Secure Shell (SSH).
Security researchers at Trend Micro have discovered
The Android Debug Bridge (
The ADB could be abused by malware to target Android phones through the port 5555. By default, Android has Android Debug Bridge (ADB) option disabled, but often vendors enable it to customize the operating system, then ship the devices with the feature turned on. In September 2018, researchers observed the Hide and Seek (HNS) IoT botnet targeting Android devices with ADB option enabled
“We observed a new cryptocurrency-mining botnet malware that arrives via open ADB (Android Debug Bridge) ports and can spread via SSH. This attack takes advantage of the way open ADB ports don’t have authentication by default, similar to the Satori botnet variant we previously reported.” reads the analysis published by Trend Micro. “This bot’s design allows it to spread from the infected host to any system that has had a previous SSH connection with the host.”
Tha attack is originated from the IP address 45[.]67[.]14[.]179 that connects to the ADB running device or system and attempt to conduct several activities. Initially, it changes the working directory to “/data/local/tmp,” because files stored there typically have default permission to execute.
The malicious code attempt to determine if it is running in a
The script for
The script also enhances the victim’s memory by enabling HugePages, in this way the system would support memory pages that are greater than its default size. The bot also attempts to lock out other threats by modifying /etc/hosts.
The malicious code also implements an evasion technique that involves deleting the downloaded files and removing the traces on the victim host.
The bot attempts to spread to any device that has previously connected to the victim via SSH. Usually, these devices are included in a “known” list of systems and allow communication without requiring further authentication after the initial key exchange.
The bot leverages two spreaders to infect systems from the “known” list via SSH, they only differ for the directories used to search “known_hosts”.
The Android-botnet already infected devices in 21 different countries, most of them in South Korea.
“Although ADB is a useful feature for administrators and developers, it is important to remember that an enabled ADB might expose the device and those connected to it to threats.” concludes Trend Micro.
“Users can also follow other best practices for defending against illicit cryptocurrency-mining activities and botnets, such as:
- Checking and changing default settings when necessary to increase security
- Updating device firmware and applying available patches
- Being aware of methods attackers use to spread these types of malware and tailoring defenses against them”
The post Android Botnet leverages ADB ports and SSH to spread appeared first on Security Affairs.