Security News > 2022 > May > EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

A rapidly evolving IoT malware dubbed "EnemyBot" is targeting content management systems, web servers and Android devices.
The Alien lab research team study found four main sections of the malware.
Py', used to download all dependencies and compile the malware into different OS architectures.
A batch file "Update.sh" is created and used to spread the malware to vulnerable targets.
"In case an Android device is connected through USB, or Android emulator running on the machine, EnemyBot will try to infect it by executing shell command," said the researcher.
"Keksec's EnemyBot appears to be just starting to spread, however due to the authors' rapid updates, this botnet has the potential to become a major threat for IoT devices and web servers," the researchers added.
News URL
https://threatpost.com/enemybot-malware-targets-web-servers-cms-tools-and-android-os/179765/
Related news
- BadBox malware disrupted on 500K infected Android devices (source)
- North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps (source)
- FBI: Free file converter sites and tools deliver malware (source)
- UAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source Tools (source)
- New Android malware uses Microsoft’s .NET MAUI to evade detection (source)
- APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- Hijacked Microsoft web domain injects spam into SharePoint servers (source)
- RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features (source)
- New Crocodilus malware steals Android users’ crypto wallet keys (source)