Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

Article with link to the original report.

the Ares infection preys on the poorly secured configurations many set-top boxes use with the ADB debugging interface in Android. In many of the boxes, TCP port 5555 has been opened for both ADB and remote management commands, making it an easy target to any attacker able to scan the open internet.

Do you have a baseline for "normal" in your network? Does it include adb traffic?
The attack uses android adb.
A display filter of tcp.port==5555 or tcp.port in {5555..5585} would be a good start.