Android Botnet leverages ADB ports and SSH to spread
Security Affairs
JUNE 22, 2019
The malicious code attempt to determine if it is running in a honeypot , then it downloads the payload and changes its permission settings to allow its execution. In order to determine what miner to deliver, the bot collects system information, such as manufacturer, hardware details, and processor architecture.
Let's personalize your content