Articles about mirai

botnet

OK, OK, MIRA-I DID IT: Botnet-building compsci kid comes clean

A former New Jersey college student has copped to helping create and run the massive Mirai DDoS botnet. Paras Jha, 21, pleaded guilty this month in an Alaska district court to two counts [PDF, PDF] of conspiracy to commit "fraud and related activity in connection with computers." In plea deals with US prosecutors, unsealed …
Shaun Nichols, 13 Dec 2017

Mirai, Mirai, pwn them all, who's the greatest botnet on the whole?

The Mirai botnet is alive and kicking more than a year after its involvement in a DDoS attack that left many of the world's biggest websites unreachable. DNS provider Dyn reckons about 100,000 Mirai-infected gadgets knocked it out back in October 2016. A study by security ratings firm SecurityScorecard, out Tuesday, found that …
John Leyden, 7 Nov 2017
Face Palm D'oh from Shutterstock

Dangle a DVR online and it'll be cracked in two minutes

Criminals are constantly attempting to log into digital video recorders by using their default credentials, the SANS Institute has found. The organisation revisited recorders because their lack of security helped the Mirai botnet run riot in October 2016, thanks to its modus operandi of logging into devices using their default …
Simon Sharwood, 29 Aug 2017

So you're planning on outsourcing some enterprise security

It makes sense to have a solid collection of security expertise within your organisation. And in fact most of us do: security is so core to most of what we do in IT that it’s a standard part of the syllabus for all the courses we do on, say, router configuration or Windows administration. These courses always have security …
Dave Cartwright, 23 Aug 2017

Mirai copycats fired the IoT-cannon at game hosts, researchers find

The Mirai botnet that took down large chunks of the Internet in 2016 was notable for hosing targets like Krebs on Security and domain host Dyn, but research presented at a security conference last week suggests a bunch of high-profile game networks were also targeted. Although Mirai's best-known targets were taken out by the …
hacker

Briton admits to router hack that DDoSed Deutsche Telekom

An as yet unnamed 29-year-old pleaded guilty on Friday to charges relating to the hijacking of more than 1.25 million Deutsche Telekom routers, according to reports in the German press. German news agency DPA and others quoted a court spokesman as saying the accused, who pleaded guilty to "attempted computer sabotage", had " …
John Leyden, 24 Jul 2017

Don't all rush out at once, but there are a million devices ripe to be the next big botnet

A wormable vulnerability involving an estimated one million digital video recorders (DVR) is at risk of creating a Mirai-style botnet, security researchers warn. UK-based security consultancy Pen Test Partners said that the issue stems from a zero-day (unpatched) flaw in networking software from Chinese manufacturer XiongMai …
John Leyden, 15 Jun 2017

Internet hygiene still stinks despite botnet and ransomware flood

Network security has improved little over the last 12 months – millions of vulnerable devices are still exposed on the open internet, leaving them defenceless to the next big malware attack. A follow-up audit by Rapid7 – the firm behind the Metasploit pen-testing tool – found that more than a million endpoints were confirmed …
John Leyden, 14 Jun 2017

Mysterious Hajime botnet has pwned 300,000 IoT devices

Hajime – the "vigilante" IoT worm that blocks rival botnets – has built up a compromised network of 300,000 malware-compromised devices, according to new figures from Kaspersky Lab. The steadily spreading Hajime IoT worm fights the Mirai botnet for control of easy-to-hack IoT products. The malware is billed as a vigilante- …
John Leyden, 27 Apr 2017
botnet

Flaws found in Linksys routers that could be used to create a botnet

Multiple models of Linksys Smart Wi-Fi Routers have vulnerabilities that might be exploited to create a botnet, security researchers at IOActive warn. The flaws could be abused to overload a router and force a reboot, deny user access, leak sensitive information about the router and connected devices, or change restricted …
John Leyden, 20 Apr 2017

Strange Mirai botnet brew blamed for powerful application layer attack

Hackers have created a potent new variant of the Mirai IoT malware. The latest variant is capable of launching application layer attacks rather than simply flooding targeted sites with junk traffic. The new botnet has already been used to hit a US college with a two-day-long attack late last month, DDoS mitigation outfit …
John Leyden, 29 Mar 2017

Dahua video kit left user credentials in plain sight

Chinese security camera/DVR company Dahua is pushing firmware patches after accusations by a security researcher that a swathe of its products carried a back door. First notified to video surveillance publication IPVM and the Full Disclosure list, the vulnerability is described as a “damn Hollywood hack, click on one button …
Image by IfH http://www.shutterstock.com/gallery-1288723p1.html

Deutsche Telekom hack suspect arrested at London airport

UK police have arrested a suspect in connection with an attack that infected nearly 1 million Deutsche Telekom routers last November. The as-yet-unnamed 29-year-old British suspect was arrested at a London airport by officers from the UK's National Crime Agency (NCA) on Wednesday, Reuters reports. The attack on Germany's …
John Leyden, 23 Feb 2017
Robots, image via Shutterstock

Battle of the botnets: My zombie horde's bigger than yours

DDoS attacks more than doubled in the last quarter of 2016 compared to the same period the year before. Although the infamous Mirai IoT botnets accounted for many of the most severe attacks, the biggest single assault came from a different zombie network, according to a new study by Akamai out Tuesday. Attacks greater than …
John Leyden, 14 Feb 2017

Lovely. Now someone's ported IoT-menacing Mirai to Windows boxes

The Mirai malware that hijacked hundreds of thousands of IoT gadgets, routers and other devices is now capable of infecting Windows systems. The software nasty, discovered in August 2016, broke into heaps of insecure Linux-powered gizmos worldwide before running distributed denial of service attacks, most notably against DNS …
John Leyden, 10 Feb 2017

Linux nasty kicks weak, hacked gadgets when they're already down

Several thousand Linux devices have been infected with a new Linux-based trojan, Russian security software firm Doctor Web warns. The Linux-Proxy-10 Trojan infects network devices running Linux, turning them into a platform for cybercrime that allows crooks to remain anonymous online. Black hats run freeware code called the …
John Leyden, 25 Jan 2017

DDoSing has evolved in the vacuum left by IoT's total absence of security

IoT botnets have transformed the threat landscape, resulting in a big increase in the size of DDoS attacks from 500Gbps in 2015 up to 800Gbps last year. Hackers have been able to "weaponise" digital video recorders, webcams and other IoT devices due to inherent security vulnerabilities, according to the DDoS mitigation firm …
John Leyden, 24 Jan 2017

Operator of DDoS protection service named as Mirai author

The author of the massive distributed denial-of-service attack malware Mirai, which ropes infected routers and internet of things devices into remotely controlled armies, is a New Jersey man, according to journo Brian Krebs. On his website this week, Krebs names a chap called Paras Jha, owner of a distributed denial-of-service …
Darren Pauli, 20 Jan 2017

Create a news alert about mirai, or find more stories about mirai.

Biting the hand that feeds IT © 1998–2018