Android Defenses Breached
On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero.
The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked and used in the aforementioned manner. The devices processing powers were used in conjunction with an internet connection to produce or mine more Monero coin.
Thought this strategy is new, there is talk that this form of attack will become common place in the near future. Almost everyone now a days has a computer or phone connected to the internet, meaning there are plenty of sources for this to occur. Computers, IoT devices, phones and tablets could all be vulnerable soon enough.
The lab that discovered this breach, Netlab360, stated that this device hacking was possible due to an open port, a function in a device that allows the operating system to communicate with the internet. The port 5555 was the main form of access and allowed the hackers to retrieve a list of Android devices that were unsecured. Once the infiltration was complete, the hackers had released a malicious software known as a worm, and not the kind that birds eat, the kind that would spread to other unsecured devices.
The port that was abused to achieve this attack was not opened by the unauthorized party, but rather hitched a ride. The 5555 ADB ports were reported to have been open already, however there is still an ongoing investigation as to why these ports would have been opened.
Moral of this story, use secured networks and ensure the security of your devices is in place.
Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!
give us a call or send us an email and let’s take a look at your system and its defenses!