Mirai Botnet Infects Devices in 164 Countries

Discussion in 'malware problems & news' started by ronjor, Oct 28, 2016.

  1. guest

    guest Guest

    The Satori Botnet Is Mass-Scanning for Exposed Ethereum Mining Rigs
    May 18, 2018
    https://www.bleepingcomputer.com/ne...ss-scanning-for-exposed-ethereum-mining-rigs/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    New Mirai Variant Adds Three Exploits
    https://www.infosecurity-magazine.com/news/new-mirai-variant-adds-three/
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Mirai-variant attack launched from Mexico
    https://www.scmagazine.com/mirai-variant-attack-launched-from-mexico/article/767506/

    Related: https://www.bleepingcomputer.com/news/security/gpon-routers-attacked-with-new-zero-day/
     
  4. guest

    guest Guest

    Hacker Fail: IoT botnet command and control server accessible via default credentials
    June 4, 2018
    https://blog.newskysecurity.com/hac...cessible-via-default-credentials-2ea7cab36f72
     
  5. guest

    guest Guest

    7 Variants (So Far) of Mirai
    Mirai is an example of the newest trend in rapidly evolving, constantly improving malware. These seven variants show how threat actors are making bad malware worse.
    June 7, 2018
    https://www.darkreading.com/vulnerabilities---threats/7-variants-(so-far)-of-mirai/d/d-id/1331953
     
  6. guest

    guest Guest

    Botnets never Die, Satori REFUSES to Fade Away
    June 15, 2018
    https://blog.netlab.360.com/botnets-never-die-satori-refuses-to-fade-away-en/
     
  7. guest

    guest Guest

    Widely used D-Link modem/router under mass attack by potent IoT botnet
    Satori unleashes worm exploiting 2-year-old vulnerability in DSL-2750B devices.
    June 20, 2018
    https://arstechnica.com/information...outer-under-mass-attack-by-potent-iot-botnet/
     
  8. guest

    guest Guest

    IoT hacker builds Huawei-based botnet, enslaves 18,000 devices in one day
    A hacker has taken only 24 hours to build a botnet which is at least 18,000-devices strong.
    July 20, 2018

    https://www.zdnet.com/article/iot-hacker-builds-huawei-based-botnet-using-18000-devices-in-one-day/
     
  9. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
  10. guest

    guest Guest

    Apache Struts exploit found in Mirai variant may signify shift in attack strategy
    September 10, 2018
    https://www.scmagazine.com/home/new...variant-may-signify-shift-in-attack-strategy/
     
  11. guest

    guest Guest

    Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique
    September 19, 2018
    https://securityaffairs.co/wordpress/76362/malware/gafgyt-bot-nup-technique.html
    ZLAB Malware Analysis Report (PDF): http://csecybsec.com/download/zlab/20180919_CSE_Gafgyt_v2.pdf
     
  12. guest

    guest Guest

    16K Strong DDoS-for-Hire Botnet Provides 420+ GB/s Club to Knock Out Websites
    Yet another Mirai fork that kills other bots on sight
    October 26, 2018

    https://news.softpedia.com/news/16k...-gb-s-club-to-knock-out-websites-523461.shtml
     
  13. guest

    guest Guest

    With Mirai Comes Miori: IoT Botnet Delivered via ThinkPHP Remote Code Execution Exploit
    December 20, 2018
    https://blog.trendmicro.com/trendla...d-via-thinkphp-remote-code-execution-exploit/
     
  14. guest

    guest Guest

    New Attacks Target Recent PHP Framework Vulnerability
    January 17, 2019
    https://www.darkreading.com/vulnera...nt-php-framework-vulnerability/d/d-id/1333676
     
  15. guest

    guest Guest

    Hakai and Yowai botnets abuse ThinkPHP vulnerabilities
    January 25, 2019
    https://www.scmagazine.com/home/sec...mework-to-expand-the-hakai-and-yowai-botnets/
     
  16. guest

    guest Guest

    New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems
    March 18, 2019
    https://unit42.paloaltonetworks.com...rprise-wireless-presentation-display-systems/
     
  17. guest

    guest Guest

    Mirai developers target embedded systems processors
    April 8, 2019
    https://www.scmagazineuk.com/mirai-developers-target-embedded-systems-processors/article/1581382
     
  18. guest

    guest Guest

    A bug in Mirai code allows crashing C2 servers
    Ankit Anubhav, a principal researcher at NewSky Security, explained how to exploit a vulnerability in the Mirai bot to crash it
    May 6, 2019

    https://securityaffairs.co/wordpress/85040/malware/mirai-servers-hack.html
     
  19. guest

    guest Guest

    New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices
    May 23, 2019
    https://blog.trendmicro.com/trendla...exploits-to-target-routers-and-other-devices/
     
  20. guest

    guest Guest

    New Mirai variant targets new devices for botnet including SD-WAN
    June 10, 2019
    https://www.scmagazineuk.com/new-mi...vices-botnet-including-sd-wan/article/1587004
     
  21. guest

    guest Guest

    Updated Miori Botnet C2 Server Tells Researchers to F*** Off
    July 11, 2019
    https://www.bleepingcomputer.com/ne...-botnet-c2-server-tells-researchers-to-f-off/
    Trend Micro: New Miori Variant Uses Unique Protocol to Communicate with C&C
     
  22. guest

    guest Guest

    Mirai malware sets sights on enterprise IoT devices ripe for picking
    July 18, 2019
    https://www.scmagazine.com/home/sec...s-since-set-its-sights-on-enterprise-devices/
    IBM X-Force: I Can’t Believe Mirais: Tracking the Infamous IoT Malware
     
  23. guest

    guest Guest

    Keeping a Hidden Identity: Mirai C&Cs in Tor Network
    July 31, 2019
    https://blog.trendmicro.com/trendla...g-a-hidden-identity-mirai-ccs-in-tor-network/
     
  24. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  25. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    It's Time for IoT Security's Next Big Step

    https://www.wired.com/story/iot-security-next-step/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.