• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Chinese botnet army reaches 5 million Android devices mark

March 17, 2018Simeon Georgiev

In recent months government agencies across the Western hemisphere as well as the big corporations have had multiple cases of being under cyber attacks. These attacks have had a variety of reasons, like disrupting their servers, compromising important data, obfuscating information and in many cases simply causing a disruption in the corporation’s function to hurt its stock valuation. Most of these attacks have been carried out by independent Chinese groups in multiple different ways. Ransomware, phishing and malware attacks have increased in 2018. There were fears that the Chinese have accelerated their cyber warfare ambitions, however the exact schematics were unknown.

Yesterday, it was revealed that the Chinese malware operation is far bigger and more comprehensive than previously imagined, as it now counts 5 million devises in its cyber army. These bots have helped it in a variety of different purposes. The new malware that has emerged, titled “RottenSys”, aims for smartphones this time. The purpose of this malware is to aggressively target civilians and push ads on their devices. It was considered a harmless unethical exercise until it was further revealed that a new Lua-written module had been placed in these ads which would convert the affected devices into a botnet as well without the user even realizing.

This new botnet has extensive capabilities and has the ability to install additional apps without the user having a clue. Most of these apps utilize UI automation which concurrently hides the apps being installed. As of right now, there is no indication that the developers behind RottenSys have been abusing the user information or using the infected devises for cryptomining related activities. The group that discovered this practice stated that although these crooks might not be abusing this loophole right now, some other group might realize this deficiency in the smartphones’ security and exploit it for some other purpose.

The group titled, Check Point has additionally revealed that this practice may have been going on since 2016. Other activities like this having been going in the same period but none of them have been able to affect as many as 5 million devices.

Check Point has stated that it is willing to work with law enforcement agencies to prevent and tackle this practice from continuing any further.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Russian Torrenting Client Caused a Malware Outbreak Next post Ransomware attack on the state court system

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.