Mirai Botnet angreb Rise Efter dets kildekode blev uploadet - Hvordan, Teknologi og pc-sikkerhed Forum | SensorsTechForum.com
TRUSSEL FJERNELSE

Mirai Botnet angreb Rise Efter dets kildekode blev uploadet

1 Star2 Stars3 Stars4 Stars5 Stars (Ingen stemmer endnu)
Loading ...

internet-of-malware-Mirai-botnet-sensorstechforumDen berygtede tingenes internet(Tingenes internet) botnet Mirai har oplevet en hurtig stigning i det globale infektion sats, malware forskere rapporterer. Når botnettet først kom ud, ingen troede det bliver denne udbredte, men efter hacker(s) creating it found no use of the botnet, they have dumped the malware online.

One particular hacker had the following message on deep web forums about this malware:

“When I first go in DDoS industry, I wasn’t planning on staying in it long. I made my money; there’re lots of eyes looking at IOT now, so it’s time to GTFO. So today, I have an amazing release for you. With Mirai, I usually pull max 380k bots from telnet alone. Men, after the Kreb DDoS, ISPs been slowly shutting down and cleaning up their act. I dag, max pull is about 300k bots, and dropping.”

Researchers at Intel MalwareTech (@malwaretechblog) have launched 400 sensors that constantly scan for Mirai real time infections and uploaded the live feed of it publicly. We have decided to let the host run for 5 minutter, and the results were shocking:

mirai-botnet-infections-5-minutes-sensorstechforum-com

Mirai has managed to gather up to 100 infections in even less than five minutes. Since it’s open source code was released, this infection rate may only rise in the future. But this is not the biggest issue. The issue is that the Mirai virus’s purpose is to cause DDoS attacks and this is no joke. We have already seen a new rapid increase in the scale of DDoS attacks (up to 1TBps) oriented towards organizations. This is both a very lucrative opportunity for cyber-criminals and a very big issue for organizations who do not have relevant DDoS protection.

Men, the release of Mirai may not be bad news after all. According to reports by Bryan (@Bry_Campbel) en malware forsker, Mirai targets weak credentials:

by_campbell-reports-mirai-source-code-sensorstechforum

Such weak credentials can later be used to see what is the strength of passwords the virus tries to hack and react properly by using much stronger passwords. And this may not only help ISPs to “clean up their act” but it may also assist organization administrators to change crucial credentials and apply relevant DDoS protection against Mirai for the moment.

What This Means About The Future of IoT

The appearing and success of the Mirai botnet is a strong argument supporting the theory that IoT cyber-attacks are increasingly becoming a very real threat and the latest trend in malware infections. If one open-source botnet that is available to anyone can cause so many infections, we must think about the security of IoT if it is to be massively implemented in the future. Because there will soon be other IoT devices that will be released for the masses and there is other malware for IoT enheder, besides DDoS botnets as well.

Avatar

Ventsislav Krastev

Ventsislav har dækket de nyeste malware, software og nyeste tech udviklinger på SensorsTechForum for 3 år nu. Han startede som en netværksadministrator. Have uddannet Marketing samt, Ventsislav har også passion for opdagelsen af ​​nye skift og innovationer i cybersikkerhed, der bliver spillet skiftere. Efter at have studeret Value Chain Management og derefter Network Administration, han fandt sin passion inden cybersecrurity og er en stærk tilhænger af grunduddannelse for alle brugere mod online sikkerhed.

Flere indlæg - Websted

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...