Hide and Seek IoT Botnet Now Spreads to New Android Devices Using ADB over Wi-Fi
#1
Quote:The Hide and Seek IoT botnet has added a new feature to its arsenal: it is now capable of infecting new Android-based devices via a Wi-Fi connection using an Android Debug Bridge (ADB) security flaw as discovered by Bitdefender Labs.

As reported by Bitdefender Labs, the new Hide and Seek variant is capable of recruiting new bots in the network by exploiting the Android Debug Bridge (ADB) feature used for troubleshooting by Android developers. Although not all Android devices come with ADB toggled on by default, some Android vendors decide to leave it enabled providing a simple to exploit attack vector using Wi-Fi ADB remote connections through the 5555. Connecting to an Android system where ADB is enabled by default allows attackers to get shell access as root, giving them the possibility to run and install anything on the compromised device with full admin privileges.

Source: https://news.softpedia.com/news/hide-and...3121.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
K-Lite Codec Pack 15.9.1 Update
Changes in 19.0.0 ...Kool — 05:00
QOwnNotes 19.1.6
25.6.1 A segmen...Kool — 15:34
Privazer 4.0.19
PrivaZer version v...Kool — 08:36
AMD announces Ryzen AI Z2 Extreme and Ry...
AMD is announcing ...harlan4096 — 08:12
AMD expands FSR4 game list to 65 titles,...
AMD adds more FSR4...harlan4096 — 08:10

[-]
Birthdays
Today's Birthdays
avatar (41)zacforat
avatar (46)NemrokReks
Upcoming Birthdays
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (38)biobdam
avatar (37)Barrackleve
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>