Chinese hackers building a botnet out of five million compromised Android devices

RottenSys malware used to create army of bots

botnet

Security researchers have discovered malware that could be assembling a botnet army composed of five million compromised Android devices.

Researchers from cyber security firm Check Point said that the RottenSys malware was targeted at Android users through an app disguised as a WiFi service. It was originally used as malware to serve fraudulent ads on users' displays.

Advertisement - Article continues below

RottenSys has been active since September 2016, amassing approximately 4,964,460 devices by March this year. The top impacted mobile devices brands are Honor, Huawei, and Xiaomi. With its ad serving capabilities, it has been able to make $115,000 in revenues every ten days.

But now evidence has come to light that a new module in the malware is attempting to create a botnet. Researchers said that hackers have been testing a new botnet campaign via the same command and control server since the beginning of February 2018.

"The attackers plan to leverage Tencent's Tinker application virtualization framework as a dropper mechanism. The payload which will be distributed can turn the victim device into a slave in a larger botnet," the researchers said.

"This botnet will have extensive capabilities including silently installing additional apps and UI automation. Interestingly, a part of the controlling mechanism of the botnet is implemented in Lua scripts. Without intervention, the attackers could re-use their existing malware distribution channel and soon grasp control over millions of devices."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

According to researchers, the malware may have entered the user's devices before purchase with half of them bought through a Chinese distributor. This suggests that a rogue employee or group may be behind the infection.

Researchers said that users can uninstall the RottenSys dropper if they know the exact package name to remove. At the present time, researchers could not say how the hackers might try to use the botnet they have created.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Most Popular

Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020