Countless wannabe hackers are asking for coding help to use Mirai, all collected by Digital Shadows, a cybersecurity firm. These sometimes laughable pleas for help show that launching DDoS has become an attractive activity for hackers of all skills levels, and even those who have no skills, want in.
Full article via Motherboard
Since the emergence of Mirai IoT botnet, there have been a noticeable increase in DDoS attacks (Distributed Denial of Service) and it looks like authorities are eager to take on culprits behind these attacks. In a statement released by Europol’s press service on Monday, it has been announced that Europol itself and with the help of US and other European law enforcement agencies 34 culprits have been arrested and 101 suspects “interviewed and cautioned.”
Read the full article on HackRead
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras. Because attackers can exploit the backdoor account via a well-crafted HTTP request, if left unpatched, the vulnerability can open the door for abuse, with crooks taking over Sony surveillance cameras and adding them to a Mirai-like botnet that can be used for relaying malicious traffic or launching DDoS attacks.
Read more on Bleeping Computer
A powerful new botnet is being blamed for massive and sustained DDoS attacks that security researchers at CloudFlare compare to Mirai when it comes to intensity and scope.
Read the full article on Threat Post
Since November 23, an unidentified group has been using a massive botnet to launch large DDoS attacks on a daily basis, targeting a small number of targets concentrated on the US west coast.
According to Cloudflare, a company that among other things provides DDoS mitigation services, the attacks aren’t linked to a variant of the Mirai malware that was used in recent months to create massive botnets and launch similar DDoS attacks.
Read the full article on Bleeping Computer
Hackers going by the handle of Popopret and BestBuy (the same hacker was also selling Terrorist database on the darknet) are offering a DDoS-for-hire service where they are renting our Mirai botnet comprising of around 400,000 infected bots. Probably they have made extensive use of the leaked source code of Mirai malware. It must be noted that both these hackers made headlines when they targeted high-profile US government institutions and businesses using GovRAT malware.
Read more on HackRead