Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
So do I understand correctly that those 2 botnets can connect only if I have have ADB enabled (usb debugging) over wifi? Or strictly the USB debugging option left on?
I really hate the sensationalism over at ZDNet.
I just verified that AT&T does not leave ports open or port forward port 5555 over their mobile network and my home and work networks certainly don't, either. So how exactly is a bot supposed to find my phone? Maybe briefly using misconfigured public wifi? Magic? And since selinux has been part of android (5.x and higher) you need to authorize devices that connect via ADB.
So, while technically, ADB does leave port 5555 open and listening with debug mode enabled, having a bot able to take control will be a lit more difficult. If you read the article, it also states that most affected devices are Android TV boxes which are cheaply made without security in mind. Many times they are running older versions of Android and come rooted out of the box.
The virtual sky is falling!!!
That maybe so but I take what AT&T technical support personnel information with a grain of salt.
When I said "verified" i didn't mean i confirmed it with an AT&T employee. I tested it myself from several different endpoints, and even opened port 5555 briefly on my own firewall to see if i could indeed connect to any device. Nopity nope nope.
Like many of these black hat warnings, it's based in truth, and the potential is there and even with proof of concept, the reality is that they are crying wolf when they see a hedgehog. Granted, a low tech home user may have a poor router configuration with the firewall passing traffic on all open ports, but i would guess that those smart enough to enable debugging would also have a better home network setup.