News

Matryosh malware attacks Android devices via ADB

Specialists of the Chinese company Qihoo 360 have discovered a new malware, or rather the Matryosh DDoS botnet, which attacks Android devices accessible on the Internet via ADB (Android Debug Bridge).

Although ADB is disabled by default on most Android devices, some gadgets are shipped with enabled ADB (most commonly on port 5555). As a result, ADB has long been a known source of problems for smartphones, TVs, set-top boxes and other “smart” devices running Android.

For example, earlier the debugging functions of the OS were abused by malware such as Ares, Trinity, Fbot, and ADB.Miner.

“360 netlab BotMon system labeled a suspicious ELF file as Mirai, but the network traffic did not match Mirai’s characteristics. This anomaly caught our attention, and after analysis, we determined that it was a new botnet that reused the Mirai framework, propagated through the ADB interface, and targeted Android-like devices with the main purpose of DDoS attacks”, — Qihoo 360 experts told the story of malware detection.

Now the researchers write that Matryosh differs from other similar botnets as it uses Tor to hide its control servers, and a complex multi-level process is used to obtain the address of this server itself, which gave the botnet its name – by analogy with a Russian doll.

Matryosh malware attacks Android

According to Qihoo 360, the same hacker group that created the Moobot botnet in 2019 and the LeetHozer botnet in 2020 may be behind the development of this malware.

Both of these malware were used to organize DDoS attacks, as well as Matryosh, which is capable of launching attacks using TCP, UDP and ICMP.

“Matryosh has no integrated scanning, vulnerability exploitation modules, its the main function are DDoS attack, it supports tcpraw, icmpecho, udpplain attacks and the basic scheme is shown in the following figure”, — Qihoo 360 researchers say.

Also, experts note possible problems in recognizing malware. Matryosh’s cryptographic design is somewhat new, they said, but still refers to Mirai’s single-byte XOR pattern, so anti-virus software easily marks it as Mirai.

Let me remind you that I also wrote that specialists from Check Point have discovered a new Rogue malware for remote access on Android.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button