A recent report found that cybercriminals have been utilizing the infamous Mirai malware as a framework on which to build enhanced IoT malware with more advanced capabilities since it first appeared in late 2016.

Mirai originally shocked the world with its massive DDoS attack which targeted millions of cheap connected IoT devices, binding IoT devices to form one large connected network, using those devices to deluge website with phony requests, overloading the sites and ultimately knocking them offline.

Since then, hackers have followed suit and have created new variants including Satori, JenX, OMG and Wicked. Mirai works by scanning for devices secured only by factory default logins, but Satori makes the code more effective by adding remote-code injection exploits. JenX relies more on external tools for scanning and exploitation. OMG includes HTTP and SOCKS proxy capabilities.

Netscout claims that with these new features, the bot author can proxy traffic through the infected IoT devices, including scans for new vulnerabilities, launching additional attacks, or pivot from the infected IoT devices to other networks that are connected to the devices.

The very evident risks IoT presents to both individual and public safety prompted the UK government released a draft IoT practice code last week designed to help manufacturers and end users better safeguard their IoT devices

The rise in Mirai-like malware should serve as a reminder to organizations that DDoS mitigation strategies and are essential; start by implementing System & Device hardening measures to ensure botnets are not established in the first place, but in the event that malware becomes present on an IoT device or traditional computing systems, that its detected in real time and can be removed before any damage is done.


Read this article on InfoSecurity Magazine



NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
NNT logo New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
email [email protected]
UK Office
NNT logo New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2020, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.