Articles worth reading
One of the best BlitzWolf selfie stick you can’t miss this year’s holiday traveling

One of the best BlitzWolf selfie stick you can’t miss this year’s holiday traveling

access_time November 28, 2017

When the new year is coming, the new year holiday becomes the hot topic. No matter where you are preparing

GeeklessTech Gadget Review: Canon EOS Rebel T6I DSLR

GeeklessTech Gadget Review: Canon EOS Rebel T6I DSLR

access_time February 8, 2015

Canon EOS Rebel T6I DSLR – Price, Strengths and weaknesses The leader in the digital SLR market, EOS Rebel line

Honda Disaster Zone Robot HondaE2-DR is a Rescue Hero in Development

Honda Disaster Zone Robot HondaE2-DR is a Rescue Hero in Development

access_time March 8, 2017

Honda is working on an amazing Disaster Zone Robot HondaE2-DR In the recent times the spike in the natural and

Blog

Smartphone Botnet Army Keeps Growing Stronger

Smartphone Botnet Army Keeps Growing Stronger

access_time March 19, 2018 chat_bubble_outline 0 comments remove_red_eye 347 views

Smartphone Botnet A New Challenge to the Security of Modern Devices

Chipmakers are always on their toes to get rid of any shortcomings, loopholes or vulnerabilities which can be exploited by the cyber criminals for their own interest. A relatively new security firm has left AMD red faced by revealing a wide range of the security vulnerabilities in its chip line-up. This firm gave just a day or two advance notice to the chipmaker before all the flaws and vulnerabilities to the public and this time it is a botnet.

The turning tides in the world of security and information

In the world of security and information tech firms has started making such decisions which are quite questionable and unprofitable to the end users.

No one is able to make out why YouTube has decided to go with the decision of adding Wikipedia links to the controversial videos present on its vast platform.

After more than a year of unrest US finally decided to come up with sanctions against Russia for launching the IRA troll factory and meddling with the presidential elections and even deploying the NotPetya malware on the global scale.

In separate political news it is worth noting that the Florida legislature has come up with a noble way to bring a heightened transparency to its criminal justice system.

This state has successfully staged the fight against the online porn menace in the past and it is doing similar for other threats which are maintained a stronghold in the last couple of years. A popular voice chat host named Zello has been allowing the ISIS accounts remain active on its platform for a long time without taking any action against him.

A botnet affecting more than 5 million devices

Security firms have found a new strain of the Chinese malware named RottenSys which had already affected more than 5 million devices.

Smartphone malwares aren’t a new thing anymore as more and more apps are filled with the junk ads. The security firm which uncovered the RottenSys malware maintains this malware exclusively works towards turning the victims into botnet without their knowledge.

At the moment security researchers are unable to understand for what purpose this botnet will be utilized in the future. But it is highly likely that these botnet will be used for a concentrated DDoS attack on massive scale in the upcoming days.

It is worth noting the China doesn’t allow Google Play Store within its territory which means millions of users will not get the benefit of the malware interference offered by it thereby getting more botnets in return.

Through analysing the botnet security analysts has found that attackers are planning to leverage the Tencent’s Tinker application to act as a dropper mechanism.

Utilizing these unusual method attackers will be to launch a large payload by evenly distributing and turning every victim device into a slave of a larger network. The resulting botnet is quite superior when it comes to capabilities and it will have the potential to install additional apps and make use of UI automation upon its will.

folder_openAssigned tags
content_copyCategorized under

No Comments

comment No comments yet

You can be first to leave a comment

Submit an answer

info_outline

Your data will be safe!

Your e-mail address will not be published. Also other data will not be shared with third person.