Home > Cyber News > New Mirai Botnet Adds 11 Exploits in Attacks against Enterprises

New Mirai Botnet Adds 11 Exploits in Attacks against Enterprises

The infamous IoT botnet Mirai has a new variant which is specifically configured to target embedded enterprise devices such as presentation system devices, surveillance systems and network storage devices.

The discovery of the latest Mirai variant was made by Palo Alto Networks’ Unit 42.

Technical Overview of the New Mirai Variant

The researchers found that the botnet was targeting WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs, both of which are entirely meant for business use.

This latest development indicates “a potential shift for using Mirai to target enterprises”, the official report said.

The previous version detected in the wild targeted enterprise vulnerabilities in Apache Struts and SonicWall, so this shift is most likely becoming a trend. As for the new one, it includes 11 new exploits in a “multi-exploit battery”, and new credentials to deploy in brute force attacks.

The researchers also discovered that the malicious payload was hosted on a compromised website in Colombia which belonged to a business focused on electronic security, integration and alarm monitoring.

Related: Mirai-Based Masuta IoT Botnet Spreads in a Worldwide Attack

What are the Mirai new features all about?

The new features help the botnet build a large attack surface. It turns out that by targeting enterprise links, the botnet gets access to larger bandwidth which can be utilized in more powerful DDoS attacks.

These developments underscore the importance for enterprises to be aware of the IoT devices on their network, change default passwords, ensure that devices are fully up-to-date on patches. And in the case of devices that cannot be patched, to remove those devices from the network as a last resort, Unit 42 said in their report.

The devices the new Mirai targets are by vendors such as LG, D-Link. Netgear, ZTE, and Linksys.

Unit 42 is urging enterprises to be aware of the IoT devices on their network, and to change default passwords. Enterprises should also make sure that all their devices are up-to-date. It’s also crucial to note that devices that cannot be patched for one reason or another may need to be removed from the network as a precaution.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree