Archive for the ‘mirai’ Category

Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices

March 19th, 2019
Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded devices intended for use within business environments in an attempt to gain control over larger bandwidth to carry out devastating DDoS attacks. Although the original creators of Mirai botnet have already been arrested and jailed, variants of the infamous IoT malware

Posted in Cyber Attack, ddos attack, ddos tool, IoT Malware, malware, mirai, mirai botnet, mirai malware, networking, Router hacking | Comments (0)

Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devices

March 18th, 2019
Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devices

Enlarge (credit: LG)

Mirai, the virulent Internet of Things malware that delivered record-setting denial-of-service attacks in 2016, has been updated to target a new crop of devices, including two found inside enterprise networks, where bandwidth is often plentiful, researchers said on Monday.

The malware infects webcams, routers, DVRs, and other Internet-connected devices, which typically ship with default credentials and run woefully outdated versions of Linux that are rarely, if ever, updated. The rapidly spreading Mirai first made a name for itself in 2016, when it helped achieve record-setting DDoS attacks against KrebsOnSecurity and French Web host OVH.

A newly discovered variant contains a total of 27 exploits, 11 of which are new to Mirai, researchers with security firm Palo Alto Networks reported in a blog post Monday. Besides demonstrating an attempt to reinvigorate Mirai’s place among powerful botnets, the new exploits signal an attempt to penetrate an arena that's largely new to Mirai. One of the 11 new exploits targets the WePresent WiPG-1000 Wireless Presentation systems, and another exploit targets LG Supersign TVs. Both of these devices are intended for use by businesses, which typically have networks that offer larger amounts of bandwidth than Mirai’s more traditional target of home consumers.

Read 8 remaining paragraphs | Comments

Posted in Biz & IT, botnets, Distributed Denial of Service attacks, Internet of things, IoT, mirai | Comments (0)

Hacker Admits to Mirai Attack Against Deutsche Telekom

July 24th, 2017

A hacker that goes by the name “BestBuy” admitted to a German court that he was behind an attack last year that knocked over a million Deutsche Telekom customers offline.

Posted in BestBuy, British National Crime Agency, Daniel K., ddos attack, Deutsche Telekom, Federal Criminal Police Office, Hackforums, mirai, Mirai Attack, mirai botnet, mirai malware | Comments (0)

With an Eye on IoT Security ARM buys Simulity for $15m

July 14th, 2017

In-brief: ARM’s purchase of Simulity adds the ability to do over the air updates to embedded SIM chips and highlights ARM’s efforts to build out security and management at IoT scale.  A tiny deal this week by ARM could have a big impact on the security of the Internet of Things. The company, which makes a wide range of low power…

Read the whole entry… »

Related Stories

Posted in ARM, connected devices, hardware, harman, Internet of things, M&A, mirai, Network, OTA update, over the air update, Patching, Platform, sensor, SIM card, smart infrastructure, software, Top Stories | Comments (0)

DDoS Attacks Can Cost Businesses Up to $2.5M Per Attack, Report Says

May 2nd, 2017

Neustar’s annual DDoS attack report says businesses can lose $2.5M on average detecting and mitigating DDoS attacks.

Posted in cost of DDoS attacks, DDoS, ddos attack, Distributed Denial of Service attacks, IoT, mirai, NeuStar, vulnerabilities | Comments (0)

Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers

October 25th, 2016

Researchers at Flashpoint said Friday’s DDoS attack against DNS provider Dyn was likely the work of script kiddies and not advanced attackers.

Posted in Allison Nixon, booters, Dyn, Dyn DDoS, Flashpoint, Government, Hackforums, IoT, IoT botnet, mirai, mirai malware, nation-state hackers, script kiddies, stressers | Comments (0)

Mirai, Mirai, on the wall – through the looking glass of the attack on Dyn

October 24th, 2016

Since Friday’s big DDoS attack on Dyn, we’ve heard a lot about what Mirai and the attack on Dyn was, much of which is guesswork to fill in the blanks. Let’s look at some of the assertions and myths that have been doing the rounds.

Posted in Botnet, Denial of Service, Dyn, Internet of things, IoT, mirai | Comments (0)

Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers

October 22nd, 2016

Ten percent of the 550,000 IoT nodes in the Mirai botnet are involved in ongoing DDoS attacks against DNS provider Dyn and others.

Posted in Application-layer DDoS, Botnet, critical infrastructure, Dale Drew, DNS providers, Dyn, Flashpoint, IoT, IoT botnet, Level 3 Communications, mirai | Comments (0)

Mirai Internet of Things Botnet Linked to Internet Outage | Flashpoint

October 22nd, 2016

In-brief: A denial of service attack on the managed DNS firm DYN was due, in part, to attacks from Internet of Things devices running the Mirai malware, the firm Flashpoint reported. Analysis by the firm Flashpoint suggests that large-scale denial of service attacks against the managed DNS provider DYN on Friday were carried out, in part, by cameras, digital video recorders and other “Internet of Things” endpoints infected with the Mirai malware. In a blog post, Flashpoint said its analysis confirmed that some of the malicious infrastructure responsible for the distributed denial-of-service (DDoS) attacks were running the Mirai malware. From the blog post: Flashpoint has confirmed that at least some of the devices used in the Dyn DNS attacks are DVRs, further matching the technical indicators and tactics, techniques, and procedures (TTPs) associated with previous known Mirai botnet attacks. However, unlike the botnets used to launch attacks against the website of […]


Definitive Guide to DLP

Posted in Botnet, DDoS, Flashpoint, mirai, Top Stories | Comments (0)

When DVRs Attack: A Post IoT Attack Analysis

October 10th, 2016

Researchers sort out what went wrong when an estimated 500,000 DVRs and IP-based cameras were used in a series of massive DDoS attacks in September.

Posted in IoT, IoT botnet, mirai, vulnerabilities | Comments (0)