Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

A new Mirai variant is targeting IoT devices – here’s how to stay safe

  • May 30, 2023
Total
0
Shares
0
0
0


A version of Mirai, called IZ1H9, has become the dominant variant of the dreaded botnet, infecting countless Linux devices and using them for different nefarious purposes.

According to Unit 42, the cybersecurity arm of Palo Alto Networks, which has been tracking IZ1H9 since August 2018, whose researchers revealed that since November 2021, a single threat actor has been actively deploying the variant. 

The campaign was only spotted in mid-April this year, and among other things, the threat actor was targeting endpoints that are already infected with Mirai, wiping previous iterations in order to only keep IZ1H9. 

Mirai botnet

“The malware also contains a function that ensures the device is running only one instance of this malware. If a botnet process already exists, the botnet client will terminate the current process and start a new one,” the researchers explained. The malware comes with a list of processes belonging not just to other botnet families, but also to other variants of Mirai. If it finds these processes running on the device, it will terminate them. 

IZ1H9 initially spreads through HTTP, SSH and Telnet protocols, the researchers added, saying that the best protection is to keep Linux devices patched and updated.

“To combat this threat, it is highly recommended that patches and updates are applied when possible,” the researchers concluded.

Botnets such as this one are usually used to mount Distributed Denial of Service (DDoS) attacks. DDoS is one of the most popular forms of attack out there, and it works by rendering a tool, or service (such as, for example, a website) inaccessible. In a DDoS attack, the attacker would flood the target server with so much bogus traffic that the server can’t handle it and eventually becomes clogged.

To get that kind of traffic, the attacker will need countless devices (such as Linux IoT devices, for example) to send traffic packets to the same address. 

Via: Infosecurity Magazine


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • News

A.I. Poses ‘Risk of Extinction,’ Industry Leaders Warn

  • May 30, 2023
View Post
Next Article
  • News

Free Darktide update aims to fix the co-op FPS’s microtransactions issue

  • May 30, 2023
View Post
You May Also Like
View Post
  • News

Asus sells the largest microLED monitor ever for a cool $200,000 — but it’s only 4K and a low refresh rate

  • September 21, 2023
View Post
  • News

Facebook now lets you create alt accounts for better privacy and organization

  • September 21, 2023
View Post
  • News

The world’s most famous magician invests in data storage startup that wants to send 100GB disks to the Moon for future humanoids

  • September 21, 2023
View Post
  • News

YouTube reveals powerful new AI tools for content creators – and we’re scared, frankly

  • September 21, 2023
View Post
  • News

CEO of DuckDuckGo Testifies in Google Case

  • September 21, 2023
View Post
  • News

Windows Copilot might be the biggest change Microsoft has ever made to its long-running OS

  • September 21, 2023
View Post
  • News

Despite general investment downturn AI sees surge in spending, survey shows

  • September 21, 2023
View Post
  • News

Everything Microsoft announced at its 2023 Surface Event

  • September 21, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.