Reaper Botnet Malware - What Is It and How to Protect IoT Devices
NEWS

Reaper Botnet Malware – What Is It and How to Protect IoT Devices

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Reaper and other threats.
Threats such as Reaper may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

New Botnet malware has been detected by malware researchers to attack IoT (Internet of Things) devices. The malware aims to compromise whole networks of IoT devices by using DdoS (denial of service) type of attacks.

It also enlists the IoT devices in a botnet, making it widespread very quickly. According to experts, the only IoT botnet attack of such scale was Mirai botnet, which became popular back in November, 2016.

Related: Mirai Botnet Takes Down Over 900K IoT Devices In Germany

Which Devices are Targeted and How They Become Compromised

Whilst the Mirai IoT malware used bruteforcing techniques to break into IoT devices that were not properly secured (with weak passwords or the default ones), the Reaper malware has implemented a similar strategy, but more advanced. This means that the Reaper malware uses hacking technques, that are used in password cracking software and other malware in order to be more effective. Such can be a pre-set list of modules as well as programs that aim to look for different exploits and weaknesses of the devices.

Researchers at Qihoo 360 and Check Point have explained that this new IoT botnet threat uses known exploits and security weaknesses in order to infiltrate insecure machines. And while so far Reaper has not yet performed DdoS attacks, like it’s predecessor Mirai, it has the potential to be even more dangerous, mainly because of the new methods the virus uses to spread, making it potentially more devastating.

Which Devices are Affected

Similar to other IoT botnet, the usual devices are targeted, such as:

  • D-Link routers.
  • Netgear routers.
  • Linksys routers.
  • Internet-connected surveillance CCTV, belonging to companies, like Vacron, AVTech and Vacron.

CheckPoint researchers have discovered that more than a half of the networks which they keep an eye on, have already been infected with the ripple malware and there are approximately 10000 devices currently enrolled in the IoT zombie network. This was discovered as a result of the ffact that all of those devices were communicating with a previously established command and control server with a hidden actual location. CheckPoint researchers advise that if your device is from the following compromised devices list, you should update it immediately and patch all security flaws.

At the present moment, experts do not know when is this malware going to use it’s DdoS features, or why It hasn’t used them yet. They do believe, however that the malware might have some specific target network of IoT devices and it is looking to spread to this network.

How to Protect Yourself?

Besides updating your end device in case it may be compromise, we advise you to read the following related article to help you increase the overall defense of your IoT devices against Botnet malware and other IoT – related intrusions.

Related: Security Tips for Configuring IoT Devices

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...