"Mirai Malware: Expanding Targets and Reloading Exploits for Massive Router Botnet"

1 min read
Source: BleepingComputer
"Mirai Malware: Expanding Targets and Reloading Exploits for Massive Router Botnet"
Photo: BleepingComputer
TL;DR Summary

A Mirai-based DDoS malware botnet known as IZ1H9 has expanded its targets by adding thirteen new payloads to exploit vulnerabilities in Linux-based routers and routers from various manufacturers. The botnet compromises devices to enlist them in its DDoS swarm and launches attacks on specified targets. The campaign targets a range of vulnerabilities dating from 2015 to 2023, affecting devices from D-Link, Zyxel, TP-Link, TOTOLINK, and others. The malware uses a command and control server to execute DDoS attacks, with supported attack types including UDP, UDP Plain, HTTP Flood, and TCP SYN. Users are advised to use strong admin credentials, update firmware, and minimize exposure of IoT devices to the public internet.

Share this article

Reading Insights

Total Reads

0

Unique Readers

0

Time Saved

2 min

vs 3 min read

Condensed

74%

420111 words

Want the full story? Read the original article

Read on BleepingComputer