iTnews
  • Home
  • News
  • Technology
  • Security

New Mirai copycat IoT botnet spreading

By Juha Saarinen on Oct 23, 2017 6:55AM
New Mirai copycat IoT botnet spreading

Code being actively modified.

Security researchers have warned that a new worm attacking internet-connected and vulnerable devices is currently spreading throughout the world.

Dubbed IoT_reaper by Chinese security vendor Qihoo 360, the malware was first spotted in September this year and has been spreading since then.

The vendor said it had found more than 10,000 unique IP addresses per day with devices that have been compromised by the malware, along with more than two million systems queued at the command and control servers Qihoo 360 is tracking.

The malware is based on the Mirai internet of things (IoT) worm that struck last year, and which has been used to compromise millions of unpatched, vulnerable devices connected to the internet around the world.

However, IoT_reaper differs from Mirai in that it doesn't attempt to crack weak device passwords - it only tries to exploit vulnerabilities.

It also doesn't exhibit aggressive scanning so as to stay unnoticed, and it comes with an execution environment for the lightweight Lua scripting language so as to enable more complex attacks, the researchers said.

IoT_reaper attacks vulnerable devices from D-Link, Netgear, Linksys, AVTech, Vacron, JAWS and GoAhead.

The researchers said they have not seen the IoT_Reaper botnet being used for denial of service attacks as with Mirai.

It does, however, contain around 100 domain name system resolvers, which can be used for DDoS amplification attacks. 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
botnetiotiot reapermiraisecurity

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Oct 23 2017
6:55AM
0 Comments

Related Articles

  • VMware, F5, Log4j added to EnemyBot attack targets
  • Gov pledges to mandate IoT cyber security standards
  • FBI Cyclops Blink operation disinfected thousands of WatchGuard appliances
  • Sandworm crafts malware to run on ASUS routers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.