Skip to Content
Uncategorized

Beware the Botnet of Apps

August 29, 2017

The proliferation of smart devices being corralled to take down the Web now has some competition, in the shape of swarms of malicious apps installed on thousands of smartphones.

Over the past year, the humble botnet—a collection of devices hacked to work with one another to send debilitating surges of data known as DDoS attacks to servers—underwent a renaissance. The huge number of insecure devices, such as video cameras and printers, that now connect to the Internet provides a hacker’s paradise, and they’ve been increasingly commandeered to take down websites and services. We even made Botnets of Things one of our 10 breakthrough technologies of 2017.

But nefarious types pulled off a similar trick by spreading 300 malicious apps across the Google Play app store. Ars Technica reports that, once installed, those apps commandeered the device on which they sat to send huge quantities of spoof traffic to websites, ultimately forcing some services offline. According to security researchers at Cloudflare, who helped an industrywide effort to understand the botnet that’s now called WireX, the hackers were at one point able to control over 120,000 IP addresses in 100 countries.

The botnet, which the researchers call "one of the first, and certainly one of the biggest, Android-based DDoS botnets," has been disabled, and the offending apps removed from the Play Store. But the news does highlight how any large collection of Internet-connected devices can be used as a botnet if hackers have the wherewithal to make it happen.

Keep Reading

Most Popular

DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.

“This is a profound moment in the history of technology,” says Mustafa Suleyman.

What to know about this autumn’s covid vaccines

New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.

Human-plus-AI solutions mitigate security threats

With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure

Next slide, please: A brief history of the corporate presentation

From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.