Security News > 2021 > February > Android Devices Prone to Botnet’s DDoS Onslaught

Researchers are warning a new botnet is recycling the Mirai malware framework and is now targeting Android devices in order to launch distributed denial-of-service attacks.
The botnet propagates through the Android Debug Bridge interface.
Mirai is an infamous botnet most widely known for its massive DDoS attack against DNS provider Dyn in 2016, which crippled Internet service on the East Coast of the United States and took down several popular services.
After establishing a connection with the TOR proxy, the botnet communicates with the TOR C2 through the proxy and waits for the execution of the commands sent by C2. Who is Behind the Matryosh Botnet?
Moobot is a fairly new botnet family based on Mirai botnet, which targets internet of things devices.
Matryosh is only one of many recent botnet strains to surface, which over the past years have included Kaiji, Dark Nexus, MootBot and the DDG botnet.
News URL
https://threatpost.com/android-devices-prone-to-botnets-ddos-onslaught/163680/
Related news
- Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices (source)
- Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet (source)
- Mirai botnet behind the largest DDoS attack to date (source)
- New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks (source)
- Vo1d malware botnet grows to 1.6 million Android TVs worldwide (source)
- Vo1d Botnet's Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries (source)
- New Eleven11bot botnet infects 86,000 devices for DDoS attacks (source)
- The Badbox botnet is back, powered by up to a million backdoored Androids (source)