Fbot is a botnet that infects Android devices through the exposed Android Debug Bridge (ADB) interface. It was first discovered in September 2018 and is believed to be a variant of the Satori botnet, a Mirai variant. Fbot is notable for its unusual behavior. Instead of using its infected devices to launch DDoS attacks or mine cryptocurrency, Fbot searches explicitly for and removes other botnet malware, such as ADB.Miner. This function has led some security experts to speculate that Fbot may be a “vigilante” botnet created by someone to remove malicious software from infected devices.
However, it is also possible that Fbot is simply a new type of botnet still under development. The attackers behind Fbot may be planning to use it for malicious purposes. Regardless of its intentions, Fbot does pose a threat to mobile application security. By infecting Android devices, Fbot can access sensitive user financial and personal data, such as passwords, credit card numbers, and location information. Fbot can also be used to launch attacks against other devices and networks.
Similar to Mirai-based malware, Fbot scans an Android device before using known exploits to access it. Once the Fbot is installed on the device, the botnet uses OpenNIC to connect to a command-and-control server on the decentralized domain name, EmerDNS. Fbot scripts, then search and remove com.ufo.miner. The com.ufo.miner is a variant of the ADBminer cryptocurrency miner. Although Fbot contains the Satori malware’s DDoS module, it appears disabled and unused by Fbot.
Arcu non odio euismod lacinia at quis aliquam etiam erat velit scelerisque in tellus id stella emmy a lacus vestibulum sed arcu non velit feugiat in ante metus dictum at tempor.
© 2025 Zimperium. All Rights Reserved. Privacy Settings Modern Slavery Act Statement