New Mirai Botnet Variant Targets IoT TV, Presentation Systems
Researchers found a new Mirai variant in the wild targeting smart signage TV and wireless presentation systems commonly used by businesses. Analysis revealed that the variant uses old and new
[Read: With Mirai comes Miori: IoT botnet delivered via ThinkPHP remote code execution exploit]
The new malware variant (detected by Trend Micro as Backdoor.Linux.MIRAI.VWIPI and Backdoor.Linux.BASHLITE.AME) was detected in early January of 2019 from a compromised website in Colombia tailoring to security and alarm integration, widening the possible impact to small and big businesses alike according to Palo Alto’s report. Out of the 27 exploits that this Mirai variant uses – previously used to target embedded devices such as IP cameras, network storage devices, and routers via Apache Struts – 11 are new to the malware
Much like prior campaigns, the new botnet variant is capable of scanning for exposed Telnet ports and using default access credentials with infected devices. It is also capable of scanning for specific devices and unpatched
[Read: Securing your routers against Mirai and other home network attacks]
Trend Micro also found the last Mirai variant, Yowai, in January, and cybercriminals are expected to continue using and developing Mirai to exploit the increasing number of IoT devices in the market. Given the larger and more damaging effects of malware that infects business systems, IoT device users are advised to immediately change their default credentials to lock out bad actors using this particular method. Systems should be patched immediately using available updates released by legitimate vendors to remove exploitable vulnerabilities.
Trend Micro solutions
- 2539 AVTECH Authentication ByPass Exploit- HTTP (Request)
- 2713 AVTECH Command Injection Exploit - HTTP (Request)
- 2499 CVE-2016-10174 - NETGEAR Remote Code Execution - HTTP (Request)
- 2806 CVE-2016-1555 - Netgear Devices - Unauthenticated Remote Code Execution - HTTP (Request)
- 2755 CVE-2017-6884 Zyxel OS Command Injection Exploit - HTTP (Request)
- 2639 CVE-2018-10562 - GPON Remote Code Execution - HTTP (Request)
- 2544 JAWS Remote Code Execution Exploit - HTTP (Request)
- 2550 DLINK Command Injection Exploit - HTTP (Request)
- 2707 DLINK Command Injection Exploit - HTTP (Request) - Variant 2
- 2754 EnGenius EnShare Remote Code Execution Exploit - HTTP (Request)
- 2692 LINKSYS Unauthenticated Remote Code Execution Exploit - HTTP (Request)
- 2548 LINKSYS Remote Code Execution - HTTP (Request)
- 2452 Wget Commandline Injection
- 2536 Netgear ReadyNAS RCE Exploit - HTTP (Request)
- 2778 ZTE ZXV10 Remote Code Execution Exploit - HTTP (Request)
Trend Micro Smart Home Network™
- 1057404 WEB D-Link DIR-645, DIR-815 diagnostic.php Command Execution (BID-58938)
- 1132318 WEB D-Link DCS-930L Authenticated Remote Command Execution
- 1133374 WEB Zyxel P660HN-T v1 Router Unauthenticated Remote Command Execution
- 1133375 WEB Zyxel P660HN-T v2 Router Unauthenticated Remote Command Execution
- 1133643 WEB WePresent WiPG-1000 Command Injection
- 1133802 WEB Netgear NETGEAR DGN2200
dnslookup .cgi Remote Command Injection (CVE-2017-6334) - 1135139 WEB Netgear Devices Unauthenticated Remote Command Execution (CVE-2016-1555)
- 1133148 MALWARE Suspicious IoT Worm TELNET Activity -1
- 1133063 MALWARE MIRAI TELNET Activity
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Artículos Recientes
- Ransomware Spotlight: Ransomhub
- Unleashing Chaos: Real World Threats Hidden in the DevOps Minefield
- From Vulnerable to Resilient: Cutting Ransomware Risk with Proactive Attack Surface Management
- AI Assistants in the Future: Security Concerns and Risk Management
- Silent Sabotage: Weaponizing AI Models in Exposed Containers