Security News > 2022 > May > EnemyBot Malware Targets Web Servers, CMS Tools and Android OS
A rapidly evolving IoT malware dubbed "EnemyBot" is targeting content management systems, web servers and Android devices.
The Alien lab research team study found four main sections of the malware.
Py', used to download all dependencies and compile the malware into different OS architectures.
A batch file "Update.sh" is created and used to spread the malware to vulnerable targets.
"In case an Android device is connected through USB, or Android emulator running on the machine, EnemyBot will try to infect it by executing shell command," said the researcher.
"Keksec's EnemyBot appears to be just starting to spread, however due to the authors' rapid updates, this botnet has the potential to become a major threat for IoT devices and web servers," the researchers added.
News URL
https://threatpost.com/enemybot-malware-targets-web-servers-cms-tools-and-android-os/179765/
Related news
- Android malware uses NFC to steal money at ATMs (source)
- New NGate Android malware uses NFC chip to steal credit card data (source)
- Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC) (source)
- New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards (source)
- SpyAgent Android malware steals your crypto recovery phrases from images (source)
- New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys (source)
- Beware: New Vo1d Malware Infects 1.3 Million Android-based TV Boxes Worldwide (source)
- New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via Telegram (source)
- New Vo1d malware infects 1.3 million Android TV streaming boxes (source)
- New Vo1d malware infects 1.3 million Android streaming boxes (source)