New Botnet Reuse the Mirai Framework to Perform DDoS Attack

Recently, the Chinese security firm Qihoo 360’s networking security division Netlab has discovered a nascent malware campaign. 

This campaign has been spotted co-opting the Android devices into a botnet along with the principal objective of carrying out distributed denial-of-service (DDoS) attacks.

The botnet malware that has been detected by the researchers at Qihoo 360’s Netlab are summoning it “Matryosh”. The security firm’s 360 Netlab BotMon system has marked a suspect ELF file as Mirai, but the network traffic didn’t match the characteristics of Mirai.

After proper investigations, the experts came to know that this is a new botnet that has reused the Mirai framework, developed through the ADB interface.

Here, the main reason for call its Matryosh is that its functions are layered like a Russian matryoshka nesting doll, utilizing the Android Debug Bridge (ADB) interface to affect all the devices.

Proliferation

According to the report, that has been declared by the…

Exit mobile version