A recent report found that cybercriminals have been utilizing the infamous Mirai malware as a framework on which to build enhanced IoT malware with more advanced capabilities since it first appeared in late 2016.

Mirai originally shocked the world with its massive DDoS attack which targeted millions of cheap connected IoT devices, binding IoT devices to form one large connected network, using those devices to deluge website with phony requests, overloading the sites and ultimately knocking them offline.

Since then, hackers have followed suit and have created new variants including Satori, JenX, OMG and Wicked. Mirai works by scanning for devices secured only by factory default logins, but Satori makes the code more effective by adding remote-code injection exploits. JenX relies more on external tools for scanning and exploitation. OMG includes HTTP and SOCKS proxy capabilities.

Netscout claims that with these new features, the bot author can proxy traffic through the infected IoT devices, including scans for new vulnerabilities, launching additional attacks, or pivot from the infected IoT devices to other networks that are connected to the devices.

The very evident risks IoT presents to both individual and public safety prompted the UK government released a draft IoT practice code last week designed to help manufacturers and end users better safeguard their IoT devices

The rise in Mirai-like malware should serve as a reminder to organizations that DDoS mitigation strategies and are essential; start by implementing System & Device hardening measures to ensure botnets are not established in the first place, but in the event that malware becomes present on an IoT device or traditional computing systems, that its detected in real time and can be removed before any damage is done.


Read this article on InfoSecurity Magazine



The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.