Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
23 résultats taggé Mirai  ✕
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/
21/05/2025 08:31:22
QRCode
archive.org

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…
For reference, the 6.3 Tbps attack last week was ten times the size of the assault launched against this site in 2016 by the Mirai IoT botnet, which held KrebsOnSecurity offline for nearly four days. The 2016 assault was so large that Akamai – which was providing pro-bono DDoS protection for KrebsOnSecurity at the time — asked me to leave their service because the attack was causing problems for their paying customers.

Since the Mirai attack, KrebsOnSecurity.com has been behind the protection of Project Shield, a free DDoS defense service that Google provides to websites offering news, human rights, and election-related content. Google Security Engineer Damian Menscher told KrebsOnSecurity the May 12 attack was the largest Google has ever handled. In terms of sheer size, it is second only to a very similar attack that Cloudflare mitigated and wrote about in April.

After comparing notes with Cloudflare, Menscher said the botnet that launched both attacks bears the fingerprints of Aisuru, a digital siege machine that first surfaced less than a year ago. Menscher said the attack on KrebsOnSecurity lasted less than a minute, hurling large UDP data packets at random ports at a rate of approximately 585 million data packets per second.

“It was the type of attack normally designed to overwhelm network links,” Menscher said, referring to the throughput connections between and among various Internet service providers (ISPs). “For most companies, this size of attack would kill them.”

krebsonsecurity EN 2025 Hit DDoS Mirai Cloudflare Aisuru botnet
GorillaBot: Technical Analysis and Code Similarities with Mirai https://any.run/cybersecurity-blog/gorillabot-malware-analysis/
26/03/2025 21:34:54
QRCode
archive.org
thumbnail

Discover technical analysis of GorillaBot, a new malware variant based on the original code of the Mirai botnet.

any.run EN 2025 GorillaBot analysis Mirai code
Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2025/01/21/mass-campaign-of-murdoc-botnet-mirai-a-new-variant-of-corona-mirai
21/01/2025 17:43:02
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit has uncovered a large-scale, ongoing operation within the Mirai campaign, dubbed Murdoc Botnet.

qualys EN 2025 Murdoc Botnet Mirai analysis
2024-12 Reference Advisory: Session Smart Router: Mirai malware found on systems when the default password remains unchanged https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-password-remains-unchanged?
22/12/2024 20:48:48
QRCode
archive.org

n Wednesday, December 11, 2024, several customers reported suspicious behavior on their Session Smart Network (SSN) platforms. These systems have been infected with the Mirai malware and were subsequently used as a DDOS attack source to other devices accessible by their network. The impacted systems were all using default passwords. Any customer not following recommended best practices and still using default passwords can be considered compromised as the default SSR passwords have been added to the virus database.

juniper EN 2024 advisory SessionSmart Router SSN Mirai default-password
DigiEver Fix That IoT Thing! https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing
20/12/2024 09:36:53
QRCode
archive.org
  • A vulnerability in DigiEver DS-2105 Pro DVRs is being exploited to spread malware.

  • The Akamai Security Intelligence Research Team (SIRT) noticed this activity in their honeypots on November 18, 2024.

  • The vulnerability was originally discovered by Ta-Lun Yen and a CVE identifier has been requested by the Akamai SIRT.

  • The malware is a Mirai variant that has been modified to use improved encryption algorithms.

  • We have included a list of indicators of compromise (IoCs) in this blog post to assist in defense against this threat.

akamai EN 2024 mirai DigiEver DS-2105 Pro DVR vulnerability
Over 300,000! GorillaBot: The New King of DDoS Attacks https://nsfocusglobal.com/over-300000-gorillabot-the-new-king-of-ddos-attacks/
03/10/2024 08:13:13
QRCode
archive.org
thumbnail

Explore the emergence of Gorilla Botnet, its DDoS tactics, global impact, and sophisticated evasion techniques.

nsfocusglobal EN 2024 GorillaBot DDoS mirai
Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day https://www.akamai.com/blog/security-research/2024-corona-mirai-botnet-infects-zero-day-sirt
29/08/2024 16:36:22
QRCode
archive.org
  • The Akamai Security Intelligence and Response Team (SIRT) has observed a botnet campaign that is abusing several previously exploited vulnerabilities, as well as a zero-day vulnerability discovered by the SIRT.

  • CVE-2024-7029 (discovered by Aline Eliovich) is a command injection vulnerability found in the brightness function of AVTECH closed-circuit television (CCTV) cameras that allows for remote code execution (RCE).

  • Once injected, the botnet spreads a Mirai variant with string names that reference the COVID-19 virus that has been seen since at least 2020.

  • We have included a list of indicators of compromise (IOCs) to assist in defense against this threat.

akamai EN 2024 botnet Mirai AVTECH zero-day vulnerability CCTV CVE-2024-7029
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery https://thehackernews.com/2024/05/mirai-botnet-exploits-ivanti-connect.html?m=1
12/05/2024 13:10:11
QRCode
archive.org

Ivanti Connect Secure (ICS) devices are under attack! Two critical vulnerabilities are being exploited to deploy the notorious Mirai botnet.

thehackernews EN 2024 Mirai Botnet Ivanti Connect Payload
Linux devices are under attack by a never-before-seen worm | Ars Technica https://arstechnica.com/security/2024/01/a-previously-unknown-worm-has-been-stealthily-targeting-linux-devices-for-a-year/
11/01/2024 12:48:32
QRCode
archive.org
thumbnail

Based on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices.

arstechnica 2024 EN Mirai variant self-replicating NoaBot cryptomining never-before-seen
InfectedSlurs Botnet Spreads Mirai via Zero-Days https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
29/11/2023 09:46:41
QRCode
archive.org
thumbnail

Akamai SIRT has uncovered two zero-day vulnerabilities that are being actively exploited to spread a Mirai variant in the wild. Read on for details and mitigation.

akamai EN 2023 Research Threat-Intelligence Mirai china-cat
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/
24/11/2023 13:49:34
QRCode
archive.org
thumbnail

Internet scans show 7,000 devices may be vulnerable. The true number could be higher.

arstechnica EN 2023 0-day routers cameras mirai
InfectedSlurs Botnet Spreads Mirai via Zero-Days https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days
22/11/2023 09:52:18
QRCode
archive.org
thumbnail

Akamai SIRT has uncovered two zero-day vulnerabilities that are being actively exploited to spread a Mirai variant in the wild.

akamai EN 2023 Research Threat-Intelligence botnet zero-day mirai china-cat
The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story | WIRED https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/
15/11/2023 14:19:31
QRCode
archive.org
thumbnail

Netflix, Spotify, Twitter, PayPal, Slack. All down for millions of people. How a group of teen friends plunged into an underworld of cybercrime and broke the internet—then went to work for the FBI.

wired EN 2023 Mirai black-hat Hackers FBI
IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits | FortiGuard Labs https://www.fortinet.com/blog/threat-research/Iz1h9-campaign-enhances-arsenal-with-scores-of-exploits
11/10/2023 21:30:32
QRCode
archive.org
thumbnail

FortiGuard Labs unmasks IZ1H9 and explores the aggressive exploits in the Mirai-Based DDoS Campaign

fortinet EN 2023 mirai IZ1H9 ealink Zyxel devices TP-Link Archer Korenix Jetwave TOTOLINK
Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. https://nsfocusglobal.com/mirai-botnets-new-wave-hailbot-kiraibot-catddos-and-their-fierce-onslaught/
07/10/2023 01:20:26
QRCode
archive.org
thumbnail

Several new Mirai variant families were widely deployed in September 2023, among which hailBot, kiraiBot and catDDoS are the most active.

nsfocusglobal EN 2023 analysis Mirai catDDoS hailBot kiraiBot
Tomcat Under Attack: Exploring Mirai Malware and Beyond https://blog.aquasec.com/tomcat-under-attack-investigating-the-mirai-malware
31/07/2023 15:02:28
QRCode
archive.org
thumbnail

Tomcat Vulnerability explore some of the techniques used by the Mirai botnet to exploit a single attack directed at one of our Apache Tomcat honeypots.

aquasec EN 2023 Tomcat Mirai botnet Apache
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/
22/06/2023 20:12:15
QRCode
archive.org
thumbnail

Since March 2023, Unit 42 researchers have observed threat actors leveraging several IoT vulnerabilities to spread a variant of the Mirai botnet.

unit42 EN 2023 Mirai analysis IoT
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices https://unit42.paloaltonetworks.com/mirai-variant-iz1h9/
27/05/2023 21:48:42
QRCode
archive.org
thumbnail

We analyze Mirai variant IZ1H9, which targets IoT devices. Our overview includes campaigns observed, botnet configuration and vulnerabilities exploited.

paloaltonetworks EN 2023 Mirai IZ1H9 IoT campaigns
Mirai Botnet Attackers Exploit TP-Link Router Bug https://duo.com/decipher/mirai-botnet-attackers-exploit-tp-link-bug
26/04/2023 21:43:45
QRCode
archive.org
thumbnail

Researchers began to detect exploit attempts in the wild targeting the patched, high-severity flaw in TP-Link routers starting on April 11.

duo decipher EN 2023 Mirai Exploit TP-Link CVE-2023-1389
Mirai Variant MooBot Targeting D-Link Devices https://unit42.paloaltonetworks.com/moobot-d-link-devices/
07/09/2022 11:09:36
QRCode
archive.org
thumbnail

Attackers are leveraging known vulnerabilities in D-Link devices to deliver MooBot, a Mirai variant, potentially leading to further DDoS attacks.

unit42 paloaltonetworks EN 2022 Mirai Variant MooBot Targeting D-Link CVE-2015-2051 CVE-2018-6530 CVE-2022-26258 CVE-2022-28958 analysis
page 1 / 2
4460 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio