1 min read

Mirai-Based Malware Continues to Dominate Botnet Variants, Report Finds

Silviu STAHIE

October 01, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Mirai-Based Malware Continues to Dominate Botnet Variants, Report Finds

Compromised IoT devices remained a problem in Q1 2020, contributing to DDoS attacks worldwide, mostly from DNS vectors, according to a new NetScout report.

The advent of IoT devices has increased the number of DDoS attacks registered over the past few years and expanded the attack vectors. While many IoT devices lack the processing power to deploy massive attacks, their sheer number allows operators to compensate.

For example, one of the most significant DDoS attack in recent history took place last year. It registered 292,000 requests per minute, lasted 13 days, and more than 400,000 IoT devices participated.

Many current IoT threats are variants based on the more infamous Mirai malware, which made a significant impact in 2016. Since then, numerous other botnets using Mirai code surfaced, causing problems with IoT hardware.

“Malicious authors continued their impressively efficient efforts to syphon in the latest IoT exploits and churn out new Mirai-based variants,” states the NetScout report. “Mirai still rules the ever-expanding IoT-based malware world, and the pandemic effect triggered massive growth in Mirai-based variants in March.”

Some of the most common Mirai-based variants include Corona, Kyton and Ares. And they are still using the same combination of usernames and passwords to try and compromise devices: guest/12345, admin/admin or guest/guest.

Other, non-Mirai, botnets in the wild include Gafgyt.

“We saw a significant spike in Gafgyt samples from February through June, although January through February, decreased compared with 2019,” say the researchers. “The spike in the number of samples is likely related to the increase in consumer devices brought online as the remote work skyrocketed during that time frame.”

There are currently 22 billion IoT devices globally, and the COVID-19 pandemic hasn’t slowed development significantly. The market is still on track to reach 41.6 billion by 2025, which means that the attack surface will only increase.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read