Security News > 2022 > May > EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

A rapidly evolving IoT malware dubbed "EnemyBot" is targeting content management systems, web servers and Android devices.
The Alien lab research team study found four main sections of the malware.
Py', used to download all dependencies and compile the malware into different OS architectures.
A batch file "Update.sh" is created and used to spread the malware to vulnerable targets.
"In case an Android device is connected through USB, or Android emulator running on the machine, EnemyBot will try to infect it by executing shell command," said the researcher.
"Keksec's EnemyBot appears to be just starting to spread, however due to the authors' rapid updates, this botnet has the potential to become a major threat for IoT devices and web servers," the researchers added.
News URL
https://threatpost.com/enemybot-malware-targets-web-servers-cms-tools-and-android-os/179765/
Related news
- OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers (source)
- Fake Microsoft Office add-in tools push malware via SourceForge (source)
- Police detains Smokeloader malware customers, seizes servers (source)
- SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps (source)
- New Android malware steals your credit cards for NFC relay attacks (source)
- SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks (source)
- Russian army targeted by new Android malware hidden in mapping app (source)
- Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised (source)
- StealC malware enhanced with stealth upgrades and data theft tools (source)
- Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures (source)