Breaking News
TrendMicro Crypto Mining Malware

TrendMicro detects Crypto Mining malware affecting Android devices

Android Debug Bridge ports is a system that was brought into place to resolve defects in apps that were installed on majority of the Android phones and tablets today. There is a discovery of a new crypto-currency-mining botnet that has begun exploiting these ports as per TrendMicro.

This malware known as the botnet malware which has been reported by TrendMicro is detected in 21 countries across the globe with South Korea leading with the highest detection rate.

This attack has been facilitated as open ADB ports do not see the need for any authentication by default, and once it has been installed, it can spread to any system that has previously shared an SSH connection.

Several devices can be connected with SSH connections. Whether it is mobiles or Internet of Things (IoT) gadgets they all connect with SSH connections making them all very susceptible.

Researchers have opined that both the systems communicate with one another without the need for any further authentication once the initial key exchange takes place.

One system considers that the other system is safe to connect to. Due to the presence of a spreading mechanism botnet malware can abuse the wide use of the process of making SSH connections.

It commences with an IP address.

45[.]67[.]14[.]179 arrives through the ADB and makes use of the command shell to update the working directory to “/data/local/tmp,” as .tmp files often have default permission to execute commands as per CoinDesk.

After the bot finds out that it has entered a honeypot, it makes use of the wget command to download the payload of three different miners, and then curl if wget is not present in the system that has been infected.

Based on the system’s manufacturer, architecture, processor type, and hardware, the malware decides which miner is best suited to exploit the victim.

It further executes a command chmod 777 a.sh, which changes the permission settings of the malicious drop. By using a command rm -rf a.sh*, the bot conceals itself from the host and deletes the downloaded file.

This command also removes all proof of where the bug started from as it spreads to other victims.

The three potential miners that can be used in the attack which are all delivered by the same URL – are:

http://198[.]98[.]51[.]104:282/x86/bash

http://198[.]98[.]51[.]104:282/arm/bash

http://198[.]98[.]51[.]104:282/aarch64/bash

The script also increases the memory of the host by enabling HugePages, thus enabling memory pages that happen to be greater than its default size to optimize mining output.

If the miners use this system the botnet tries to make the URL as invalid and kills them by changing the entire host code.

Pernicious and malicious crypto-mining drops are evolving rapidly to find new ways to exploits people. In the summer of last year, TrendMicro came across another ADB-exploiting that they called the Satoshi Variant.

It was seen that Outlaw was spreading another Monero mining variant across China with the use of brute-force attacks against servers.

Researchers, however, had not yet found out if the botnet had started mining operations, but an Android APK in the script was found thus raising suspicion that Android devices may be targeted.

About David Aguiar

David is a tech enthusiast in the Android ecosystem and he uses this space to share his insights and opinions about Android apps, latest happenings and leaks.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.