Mirai is spreading from Windows this time ...A talented cyber attacker has developed an advanced Windows botnet to spread the famous Mirai malware. Developing markets, which are investing heavily in interna - tional technology, especially in Turkey,Mirai is spreading from Windows this time ...The Windows-based spreader is richer and more robust than the original Mirai code base, but the components, techniques, and functionality of the new version are based on years. This emitter's Mirai malware is limited in its ability to spread: Mirai boots can be sent from a compromised Windows computer to a vulnerable Linux IoT (Internet of Things) via a brute-force attack if a remote telnet connection is involved.Despite this limitation, it is clear that the code is the result of a more experienced developer, probably someone who is beginning to take on new interests with Mirai. Some of the tips left behind, such as the fact that the code contained in the software was compiled in a Chinese system linked to servers in Taiwan, and the code-signing certificates stolen from Chinese companies were abused, highlight the possibility that the developer is a Chinese-speaking one.According to Kaspersky Lab telemetry data, about 500 individual systems were attacked by the Windows bot in 2017, and these attempts were detected and blocked.Based on the geographical positioning of the IP addresses in the second phase of the attack, the most vulnerable countries have invested heavily in the connected technologies and are developing in India, Vietnam, Saudi Arabia, China, Iran, Brazil, Morocco, Turkey, Malawi, Tunisia, Russia, Moldova, Venezuela, the Philippines, Colombia, Romania, Peru, Egypt and Bangladesh.Kaspersky Lab is working with the Computer Emergency Response Team (CERT), hosting service providers and network operators to respond to this growing threat to the Internet infrastructure. Rapid and successful disinfection of these servers is minimizing the risk and disadvantages of growing IOT based botnets. Kaspersky Lab's experiences and relationships with CERTs and providers around the world are helping to speed those efforts.
Mirai is spreading from Windows this time ...A talented cyber attacker has developed an advanced Windows botnet to spread the famous Mirai malware. Developing markets, which are investing heavily in interna - tional technology, especially in Turkey,Mirai is spreading from Windows this time ...The Windows-based spreader is richer and more robust than the original Mirai code base, but the components, techniques, and functionality of the new version are based on years. This emitter's Mirai malware is limited in its ability to spread: Mirai boots can be sent from a compromised Windows computer to a vulnerable Linux IoT (Internet of Things) via a brute-force attack if a remote telnet connection is involved.Despite this limitation, it is clear that the code is the result of a more experienced developer, probably someone who is beginning to take on new interests with Mirai. Some of the tips left behind, such as the fact that the code contained in the software was compiled in a Chinese system linked to servers in Taiwan, and the code-signing certificates stolen from Chinese companies were abused, highlight the possibility that the developer is a Chinese-speaking one.According to Kaspersky Lab telemetry data, about 500 individual systems were attacked by the Windows bot in 2017, and these attempts were detected and blocked.Based on the geographical positioning of the IP addresses in the second phase of the attack, the most vulnerable countries have invested heavily in the connected technologies and are developing in India, Vietnam, Saudi Arabia, China, Iran, Brazil, Morocco, Turkey, Malawi, Tunisia, Russia, Moldova, Venezuela, the Philippines, Colombia, Romania, Peru, Egypt and Bangladesh.Kaspersky Lab is working with the Computer Emergency Response Team (CERT), hosting service providers and network operators to respond to this growing threat to the Internet infrastructure. Rapid and successful disinfection of these servers is minimizing the risk and disadvantages of growing IOT based botnets. Kaspersky Lab's experiences and relationships with CERTs and providers around the world are helping to speed those efforts.
Comments
Post a Comment