Security News > 2022 > May > EnemyBot Malware Targets Web Servers, CMS Tools and Android OS
A rapidly evolving IoT malware dubbed "EnemyBot" is targeting content management systems, web servers and Android devices.
The Alien lab research team study found four main sections of the malware.
Py', used to download all dependencies and compile the malware into different OS architectures.
A batch file "Update.sh" is created and used to spread the malware to vulnerable targets.
"In case an Android device is connected through USB, or Android emulator running on the machine, EnemyBot will try to infect it by executing shell command," said the researcher.
"Keksec's EnemyBot appears to be just starting to spread, however due to the authors' rapid updates, this botnet has the potential to become a major threat for IoT devices and web servers," the researchers added.
News URL
https://threatpost.com/enemybot-malware-targets-web-servers-cms-tools-and-android-os/179765/
Related news
- Rackspace internal monitoring web servers hit by zero-day (source)
- 5 Must-Have Tools for Effective Dynamic Malware Analysis (source)
- New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (source)
- TrickMo malware steals Android PINs using fake lock screen (source)
- Finland seizes servers of 'Sipultie' dark web drugs market (source)
- Perfctl malware strikes again as crypto-crooks target Docker Remote API servers (source)
- Russia targets Ukrainian conscripts with Windows, Android malware (source)
- Ransomware hits web hosting servers via vulnerable CyberPanel instances (source)
- Android malware "FakeCall" now reroutes bank calls to attackers (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)