Countless wannabe hackers are asking for coding help to use Mirai, all collected by Digital Shadows, a cybersecurity firm. These sometimes laughable pleas for help show that launching DDoS has become an attractive activity for hackers of all skills levels, and even those who have no skills, want in.
Full article via Motherboard
Since the emergence of Mirai IoT botnet, there have been a noticeable increase in DDoS attacks (Distributed Denial of Service) and it looks like authorities are eager to take on culprits behind these attacks. In a statement released by Europol’s press service on Monday, it has been announced that Europol itself and with the help of US and other European law enforcement agencies 34 culprits have been arrested and 101 suspects “interviewed and cautioned.”
Read the full article on HackRead
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras. Because attackers can exploit the backdoor account via a well-crafted HTTP request, if left unpatched, the vulnerability can open the door for abuse, with crooks taking over Sony surveillance cameras and adding them to a Mirai-like botnet that can be used for relaying malicious traffic or launching DDoS attacks.
Read more on Bleeping Computer
A powerful new botnet is being blamed for massive and sustained DDoS attacks that security researchers at CloudFlare compare to Mirai when it comes to intensity and scope.
Read the full article on Threat Post
Security experts from CloudFlare observed a new botnet that emerged in the wild and it could be dangerous as its predecessor Mirai.
Read the full article on Security Affairs
A new version of Mirai — a malware that’s been enslaving poorly secured IoT devices — has found a new victim: vulnerable internet routers from Germany’s Deutsche Telekom. The spread of the new strain of Mirai has caused internet connection problems for close to a million Deutsche Telekom customers, the company reported on Monday [November 28, 2016].
Read more on CSO Online
Hackers going by the handle of Popopret and BestBuy (the same hacker was also selling Terrorist database on the darknet) are offering a DDoS-for-hire service where they are renting our Mirai botnet comprising of around 400,000 infected bots. Probably they have made extensive use of the leaked source code of Mirai malware. It must be noted that both these hackers made headlines when they targeted high-profile US government institutions and businesses using GovRAT malware.
Read more on HackRead
A GitHub user going by Leo Linsky has forked a repo created by researcher Jerry Gamblin to create an anti-worm “nematode” that could help to patch vulnerable devices used in the massive Mirai distributed denial of service attack.
Full article via The Register