Tag: Mirai

Europol and US authorities bust 34 DDoS attackers and 101 suspects

Since the emergence of Mirai IoT botnet, there have been a noticeable increase in DDoS attacks (Distributed Denial of Service) and it looks like authorities are eager to take on culprits behind these attacks. In a statement released by Europol’s press service on Monday, it has been announced that Europol itself and with the help of US and other European law enforcement agencies 34 culprits have been arrested and 101 suspects “interviewed and cautioned.”

Read the full article on HackRead

Backdoor Found in 80 Sony Surveillance Camera Models

Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras. Because attackers can exploit the backdoor account via a well-crafted HTTP request, if left unpatched, the vulnerability can open the door for abuse, with crooks taking over Sony surveillance cameras and adding them to a Mirai-like botnet that can be used for relaying malicious traffic or launching DDoS attacks.

Read more on Bleeping Computer

Upgraded Mirai botnet disrupts Deutsche Telekom by infecting routers

A new version of Mirai — a malware that’s been enslaving poorly secured IoT devices — has found a new victim: vulnerable internet routers from Germany’s Deutsche Telekom. The spread of the new strain of Mirai has caused internet connection problems for close to a million Deutsche Telekom customers, the company reported on Monday [November 28, 2016].

Read more on CSO Online

Evolved Version of Mirai DDoS Botnet Goes Up for Rent

Hackers going by the handle of Popopret and BestBuy (the same hacker was also selling Terrorist database on the darknet) are offering a DDoS-for-hire service where they are renting our Mirai botnet comprising of around 400,000 infected bots. Probably they have made extensive use of the leaked source code of Mirai malware. It must be noted that both these hackers made headlines when they targeted high-profile US government institutions and businesses using GovRAT malware.

Read more on HackRead