Security News > 2022 > May > EnemyBot Malware Targets Web Servers, CMS Tools and Android OS
A rapidly evolving IoT malware dubbed "EnemyBot" is targeting content management systems, web servers and Android devices.
The Alien lab research team study found four main sections of the malware.
Py', used to download all dependencies and compile the malware into different OS architectures.
A batch file "Update.sh" is created and used to spread the malware to vulnerable targets.
"In case an Android device is connected through USB, or Android emulator running on the machine, EnemyBot will try to infect it by executing shell command," said the researcher.
"Keksec's EnemyBot appears to be just starting to spread, however due to the authors' rapid updates, this botnet has the potential to become a major threat for IoT devices and web servers," the researchers added.
News URL
https://threatpost.com/enemybot-malware-targets-web-servers-cms-tools-and-android-os/179765/
Related news
- SpyLoan Android malware on Google play installed 8 million times (source)
- 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play (source)
- New DroidBot Android banking malware spreads across Europe (source)
- New DroidBot Android malware targets 77 banking, crypto apps (source)
- New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools (source)
- Germany sinkholes BadBox malware pre-loaded on Android devices (source)
- Germany blocks BadBox malware loaded on 30,000 Android devices (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)
- Android malware found on Amazon Appstore disguised as health app (source)
- BadBox malware botnet infects 192,000 Android devices despite disruption (source)