TrendMicro Detects Crypto Mining Malware Affecting Android Devices
The botnet enters through the Android Debug Bridge port and spreads through SSH.

A new cryptocurrency-mining botnet has been detected exploiting Android Debug Bridge ports, a system designed to resolve app defects installed on a majority of Android phones and tablets.
The botnet malware, as reported by Trend Micro, has been detected in 21 countries and is most prevalent in South Korea.
The attack takes advantage of the way open ADB ports don’t require authentication by default, and once installed is designed to spread to any system that has previously shared an SSH connection. SSH connections connect a wide range of devices – everything from mobile to Internet of Things (IoT) gadgets – meaning a lot of products are susceptible.
"Being a known device means the two systems can communicate with each other without any further authentication after the initial key exchange, each system considers the other as safe," the researchers say. "The presence of a spreading mechanism may mean that this malware can abuse the widely used process of making SSH connections."
It begins with an IP address.
45[.]67[.]14[.]179 arrives through the ADB and uses the command shell to update the working directory to "/data/local/tmp,” as .tmp files often have default permission to execute commands.
Once the bot determines its entered a honeypot, it uses the wget command to download the payload of three different miners, and curl if wget is not present in the infected system.
The malware determines which miner is best suited to exploit the victim depending on the system’s manufacturer, architecture, processor type, and hardware.
An additional command, chmod 777 a.sh, is then executed to change the permission settings of the malicious drop. Finally, the bot conceals itself from the host using another command, rm -rf a.sh*, to delete the downloaded file. This also hides the trail of where the bug originated from as it spreads to other victims.
Researchers examined the invading script and determined the three potential miners that can be used in the attack – all delivered by the same URL – are:
http://198[.]98[.]51[.]104:282/x86/bash
http://198[.]98[.]51[.]104:282/arm/bash
http://198[.]98[.]51[.]104:282/aarch64/bash
They also found the script enhances the host’s memory by enabling HugePages, which enables memory pages that are greater than its default size, to optimize mining output.
If miners are already found using the system the botnet attempts to invalidate their URL and kill them by changing the host code.
Pernicious and malicious cryptomining drops are continually evolving new ways to exploit their victims. Last summer, Trend Micro observed another ADB-exploiting that they dubbed the Satoshi Variant.
Outlaw, was spotted in the past weeks spreading another Monero mining variant across China through brute-force attacks against servers. At the time researchers hadn’t determined whether the botnet had begun mining operations, but found an Android APK in the script, indicating Android devices may be targeted.
Image via Shutterstock.
More For You
KuCoin Hits Record Market Share as 2025 Volumes Outpace Crypto Market

KuCoin captured a record share of centralised exchange volume in 2025, with more than $1.25tn traded as its volumes grew faster than the wider crypto market.
What to know:
- KuCoin recorded over $1.25 trillion in total trading volume in 2025, equivalent to an average of roughly $114 billion per month, marking its strongest year on record.
- This performance translated into an all-time high share of centralised exchange volume, as KuCoin’s activity expanded faster than aggregate CEX volumes, which slowed during periods of lower market volatility.
- Spot and derivatives volumes were evenly split, each exceeding $500 billion for the year, signalling broad-based usage rather than reliance on a single product line.
- Altcoins accounted for the majority of trading activity, reinforcing KuCoin’s role as a primary liquidity venue beyond BTC and ETH at a time when majors saw more muted turnover.
- Even as overall crypto volumes softened mid-year, KuCoin maintained elevated baseline activity, indicating structurally higher user engagement rather than short-lived volume spikes.
More For You
Silver nears $1B in volume on Hyperliquid as BTC remains frozen: Asia Morning Briefing

Silver perps have more volume on Hyperliquid than SOL or XRP.
What to know:
- Silver futures on the Hyperliquid crypto derivatives exchange have surged to become one of its most active markets, ranking just behind bitcoin and ether in trading volume.
- The SILVER-USDC contract’s high volume, sizable open interest and slightly negative funding suggest traders are using crypto infrastructure for volatility and hedging in macro commodities rather than for directional crypto bets.
- Bitcoin is holding near $88,000 in a "defensive equilibrium" with cooling ETF inflows, uneven derivatives positioning and rising demand for downside protection, while ether lags and capital rotates toward hard assets like gold and silver.











