There's an odd new addition to the extended family of Mirai-inspired IoT botnets, and so far its only obvious victim is a competing botnet whose malware is targeted for removal from any infected devices.
Dubbed Fbot, the malware is also unusual because rather than using standard DNS to communicate with the command-and-control server, it instead uses blockchain-based DNS, according to a blog post from researchers at Qihoo 360's Netlab division.
Upon infection, Fbot is designed to specifically uninstall com.ufo.miner, a variant of the ADB.Miner cryptomining botnet that was discovered earlier this year infecting various devices such as mobile phones, media players and smart TVs.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.