Recently, the Chinese security firm Qihoo 360’s networking security division Netlab has discovered a nascent malware campaign.
This campaign has been spotted co-opting the Android devices into a botnet along with the principal objective of carrying out distributed denial-of-service (DDoS) attacks.
The botnet malware that has been detected by the researchers at Qihoo 360’s Netlab are summoning it “Matryosh”. The security firm’s 360 Netlab BotMon system has marked a suspect ELF file as Mirai, but the network traffic didn’t match the characteristics of Mirai.
After proper investigations, the experts came to know that this is a new botnet that has reused the Mirai framework, developed through the ADB interface.
Here, the main reason for call its Matryosh is that its functions are layered like a Russian matryoshka nesting doll, utilizing the Android Debug Bridge (ADB) interface to affect all the devices.
Proliferation
According to the report, that has been declared by the…