<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Meet Linux.Mirai Trojan, a DDoS nightmare</title>
	<atom:link href="http://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 21:03:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1815516</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Oct 2023 13:24:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1815516</guid>
		<description><![CDATA[MALWARE &amp; THREATSMirai Variant IZ1H9 Adds 13 Exploits to Arsenal
https://www.securityweek.com/mirai-variant-iz1h9-adds-13-exploits-to-arsenal/

A Mirai botnet variant tracked as IZ1H9 has updated its arsenal with 13 exploits targeting various routers, IP cameras, and other IoT devices.

A variant of the Mirai botnet has recently updated its arsenal of tools with 13 exploits targeting vulnerabilities in IoT devices from D-Link, TP-Link, Zyxel, and various other manufactures, Fortinet reports.

Tracked as IZ1H9 and first discovered in August 2018, this Mirai variant is one of the most active, exploiting unpatched vulnerabilities in IoT devices to ensnare them and abuse them in distributed denial-of-service (DDoS) attacks.

Following the addition of exploits for several new security bugs earlier this year, IZ1H9 has recently expanded its arsenal once again, now packing approximately 30 exploits for D-Link, Geutebruck, Korenix, Netis, Sunhillo, Totolink, TP-Link, Yealink, and Zyxel flaws.

Exploitation of these vulnerabilities peaked on September 6, when Fortinet saw thousands of attack attempts.

Of the newly added exploits, four target D-Link issues tracked as CVE-2015-1187, CVE-2016-20017, CVE-2020-25506, and CVE-2021-45382. These critical-severity flaws allow remote attackers to execute arbitrary code on affected devices.

According to Fortinet, eight other exploits target arbitrary command execution bugs impacting the firmware that UDP Technology supplies to Geutebruck and other OEMs for their IP cameras.]]></description>
		<content:encoded><![CDATA[<p>MALWARE &amp; THREATSMirai Variant IZ1H9 Adds 13 Exploits to Arsenal<br />
<a href="https://www.securityweek.com/mirai-variant-iz1h9-adds-13-exploits-to-arsenal/" rel="nofollow">https://www.securityweek.com/mirai-variant-iz1h9-adds-13-exploits-to-arsenal/</a></p>
<p>A Mirai botnet variant tracked as IZ1H9 has updated its arsenal with 13 exploits targeting various routers, IP cameras, and other IoT devices.</p>
<p>A variant of the Mirai botnet has recently updated its arsenal of tools with 13 exploits targeting vulnerabilities in IoT devices from D-Link, TP-Link, Zyxel, and various other manufactures, Fortinet reports.</p>
<p>Tracked as IZ1H9 and first discovered in August 2018, this Mirai variant is one of the most active, exploiting unpatched vulnerabilities in IoT devices to ensnare them and abuse them in distributed denial-of-service (DDoS) attacks.</p>
<p>Following the addition of exploits for several new security bugs earlier this year, IZ1H9 has recently expanded its arsenal once again, now packing approximately 30 exploits for D-Link, Geutebruck, Korenix, Netis, Sunhillo, Totolink, TP-Link, Yealink, and Zyxel flaws.</p>
<p>Exploitation of these vulnerabilities peaked on September 6, when Fortinet saw thousands of attack attempts.</p>
<p>Of the newly added exploits, four target D-Link issues tracked as CVE-2015-1187, CVE-2016-20017, CVE-2020-25506, and CVE-2021-45382. These critical-severity flaws allow remote attackers to execute arbitrary code on affected devices.</p>
<p>According to Fortinet, eight other exploits target arbitrary command execution bugs impacting the firmware that UDP Technology supplies to Geutebruck and other OEMs for their IP cameras.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1812761</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 07 Sep 2023 07:21:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1812761</guid>
		<description><![CDATA[Mirai variant infects low-cost Android TV boxes for DDoS attacks https://www.bleepingcomputer.com/news/security/mirai-variant-infects-low-cost-android-tv-boxes-for-ddos-attacks/

A new Mirai malware botnet variant has been spotted infecting inexpensive Android TV set-top boxes used by millions for media streaming. According to Dr. Web&#039;s antivirus team, the current trojan is a new version of the &#039;Pandora&#039;
backdoor that first appeared in 2015.

The primary targets of this campaign are low-cost Android TV boxes like Tanix
TX6 TV Box, MX10 Pro 6K, and H96 MAX X3, which feature quad-core processors capable of launching powerful DDoS attacks even in small swarm sizes.]]></description>
		<content:encoded><![CDATA[<p>Mirai variant infects low-cost Android TV boxes for DDoS attacks <a href="https://www.bleepingcomputer.com/news/security/mirai-variant-infects-low-cost-android-tv-boxes-for-ddos-attacks/" rel="nofollow">https://www.bleepingcomputer.com/news/security/mirai-variant-infects-low-cost-android-tv-boxes-for-ddos-attacks/</a></p>
<p>A new Mirai malware botnet variant has been spotted infecting inexpensive Android TV set-top boxes used by millions for media streaming. According to Dr. Web&#8217;s antivirus team, the current trojan is a new version of the &#8216;Pandora&#8217;<br />
backdoor that first appeared in 2015.</p>
<p>The primary targets of this campaign are low-cost Android TV boxes like Tanix<br />
TX6 TV Box, MX10 Pro 6K, and H96 MAX X3, which feature quad-core processors capable of launching powerful DDoS attacks even in small swarm sizes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1806683</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 26 Jun 2023 06:55:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1806683</guid>
		<description><![CDATA[IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/

Since March 2023, Unit 42 researchers have observed threat actors leveraging several IoT vulnerabilities to spread a variant of the Mirai botnet.

The threat actors have the ability to gain complete control over the compromised devices, integrating those devices into the botnet. These devices are then used to execute additional attacks, including distributed denial-of-service (DDoS) attacks.

The widespread adoption of IoT devices has become a ubiquitous trend. However, the persistent security concerns surrounding these devices cannot be ignored.
The Mirai botnet, discovered back in 2016, is still active today. A significant part of the reason for its popularity among threat actors lies in the security flaws of IoT devices.]]></description>
		<content:encoded><![CDATA[<p>IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits <a href="https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/" rel="nofollow">https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/</a></p>
<p>Since March 2023, Unit 42 researchers have observed threat actors leveraging several IoT vulnerabilities to spread a variant of the Mirai botnet.</p>
<p>The threat actors have the ability to gain complete control over the compromised devices, integrating those devices into the botnet. These devices are then used to execute additional attacks, including distributed denial-of-service (DDoS) attacks.</p>
<p>The widespread adoption of IoT devices has become a ubiquitous trend. However, the persistent security concerns surrounding these devices cannot be ignored.<br />
The Mirai botnet, discovered back in 2016, is still active today. A significant part of the reason for its popularity among threat actors lies in the security flaws of IoT devices.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1804040</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 26 May 2023 11:21:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1804040</guid>
		<description><![CDATA[The Strange Story of the Teens Behind the Mirai Botnet 
https://spectrum.ieee.org/mirai-botnet

Their DDoS malware threatened the entire Internet]]></description>
		<content:encoded><![CDATA[<p>The Strange Story of the Teens Behind the Mirai Botnet<br />
<a href="https://spectrum.ieee.org/mirai-botnet" rel="nofollow">https://spectrum.ieee.org/mirai-botnet</a></p>
<p>Their DDoS malware threatened the entire Internet</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1800638</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 17 Apr 2023 08:30:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1800638</guid>
		<description><![CDATA[New Mirai Variant Employs Uncommon Tactics to Distribute Malware https://www.darkreading.com/remote-workforce/new-mirai-variant-employs-uncommon-tactics-to-distribute-malware
A new version of a Mirai variant called RapperBot is the latest example of malware using relatively uncommon or previously unknown infection vectors to try and spread widely. RapperBot first surfaced last year as Internet of Things (IoT) malware containing large chunks of Mirai source code but with some substantially different functionality compared with other Mirai variants. The differences included the use of a new protocol for command-and-control (C2) communications and a built-in feature for brute-forcing SSH servers rather than Telnet services, as is common in Mirai variants]]></description>
		<content:encoded><![CDATA[<p>New Mirai Variant Employs Uncommon Tactics to Distribute Malware <a href="https://www.darkreading.com/remote-workforce/new-mirai-variant-employs-uncommon-tactics-to-distribute-malware" rel="nofollow">https://www.darkreading.com/remote-workforce/new-mirai-variant-employs-uncommon-tactics-to-distribute-malware</a><br />
A new version of a Mirai variant called RapperBot is the latest example of malware using relatively uncommon or previously unknown infection vectors to try and spread widely. RapperBot first surfaced last year as Internet of Things (IoT) malware containing large chunks of Mirai source code but with some substantially different functionality compared with other Mirai variants. The differences included the use of a new protocol for command-and-control (C2) communications and a built-in feature for brute-forcing SSH servers rather than Telnet services, as is common in Mirai variants</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1795855</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Feb 2023 10:13:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1795855</guid>
		<description><![CDATA[Mirai Variant V3G4 Targets IoT Devices
https://unit42.paloaltonetworks.com/mirai-variant-v3g4/
- From July to December 2022, Unit 42 researchers observed a Mirai variant called V3G4, which was leveraging several vulnerabilities to spread itself. Once the vulnerable devices are compromised, they will be fully controlled by attackers and become a part of the botnet. The threat actor has the capability to utilize those devices to conduct further attacks, such as distributed denial-of-service (DDoS) attacks.
The exploit attempts captured by Unit 42 researchers leverage the aforementioned vulnerabilities to spread V3G4, which targets exposed servers and networking devices running Linux]]></description>
		<content:encoded><![CDATA[<p>Mirai Variant V3G4 Targets IoT Devices<br />
<a href="https://unit42.paloaltonetworks.com/mirai-variant-v3g4/" rel="nofollow">https://unit42.paloaltonetworks.com/mirai-variant-v3g4/</a><br />
- From July to December 2022, Unit 42 researchers observed a Mirai variant called V3G4, which was leveraging several vulnerabilities to spread itself. Once the vulnerable devices are compromised, they will be fully controlled by attackers and become a part of the botnet. The threat actor has the capability to utilize those devices to conduct further attacks, such as distributed denial-of-service (DDoS) attacks.<br />
The exploit attempts captured by Unit 42 researchers leverage the aforementioned vulnerabilities to spread V3G4, which targets exposed servers and networking devices running Linux</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1788927</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 07 Dec 2022 14:25:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1788927</guid>
		<description><![CDATA[Mirai Botnet and Gafgyt DDoS Team Up Against SOHO Routers
https://isc.sans.edu/diary/Mirai+Botnet+and+Gafgyt+DDoS+Team+Up+Against+SOHO+Routers/29304
Since 2014, self-replicating variants of DDoS attacks against routers and Linux-based IoT devices have been rampant. Gafgyt botnets target vulnerable IoT devices and use them to launch large-scale distributed denial-of-service attacks. SOHO and IoT devices are ubiquitous, less likely to have secure configurations or routine patches, and more likely to be at the internet edge. Attacks against these devices are less likely to be identified by enterprise monitoring techniques, and compromise may go unnoticed. Unwitting users then become part of attack propagation.]]></description>
		<content:encoded><![CDATA[<p>Mirai Botnet and Gafgyt DDoS Team Up Against SOHO Routers<br />
<a href="https://isc.sans.edu/diary/Mirai+Botnet+and+Gafgyt+DDoS+Team+Up+Against+SOHO+Routers/29304" rel="nofollow">https://isc.sans.edu/diary/Mirai+Botnet+and+Gafgyt+DDoS+Team+Up+Against+SOHO+Routers/29304</a><br />
Since 2014, self-replicating variants of DDoS attacks against routers and Linux-based IoT devices have been rampant. Gafgyt botnets target vulnerable IoT devices and use them to launch large-scale distributed denial-of-service attacks. SOHO and IoT devices are ubiquitous, less likely to have secure configurations or routine patches, and more likely to be at the internet edge. Attacks against these devices are less likely to be identified by enterprise monitoring techniques, and compromise may go unnoticed. Unwitting users then become part of attack propagation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1783404</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 14 Oct 2022 10:19:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1783404</guid>
		<description><![CDATA[Mirai Botnet Launched 2.5 Tbps DDoS Attack Against Minecraft Server
https://www.securityweek.com/mirai-botnet-launched-25-tbps-ddos-attack-against-minecraft-server

A Mirai botnet variant has launched a distributed denial-of-service (DDoS) attack that peaked at 2.5 terabytes per second (Tbps), according to Cloudflare, which described it as the largest attack it has seen in terms of bitrate.

The attack was aimed at a Minecraft server named Wynncraft and it involved UDP and TCP floods. However, the web security firm said it mitigated the attack, preventing it from causing any disruption to the game.

While this may have been a record-breaking attack for Cloudflare, Microsoft last year observed an attack that peaked at 3.47 Tbps and another that reached 3.25 Tbps.

Cloudflare this year also saw an attack reaching 26 million requests per second (RPS). The attack was noteworthy particularly for the fact that it was powered by a small botnet of only 5,000 devices. However, in terms of RPS, Google saw the biggest attack known to date, which peaked at 46 million RPS.

“The entire 2.5 Tbps attack lasted about 2 minutes, and the peak of the 26M rps attack only 15 seconds,” Cloudflare explained. “This emphasizes the need for automated, always-on solutions. Security teams can’t respond quick enough. By the time the security engineer looks at the PagerDuty notification on their phone, the attack has subsided.”]]></description>
		<content:encoded><![CDATA[<p>Mirai Botnet Launched 2.5 Tbps DDoS Attack Against Minecraft Server<br />
<a href="https://www.securityweek.com/mirai-botnet-launched-25-tbps-ddos-attack-against-minecraft-server" rel="nofollow">https://www.securityweek.com/mirai-botnet-launched-25-tbps-ddos-attack-against-minecraft-server</a></p>
<p>A Mirai botnet variant has launched a distributed denial-of-service (DDoS) attack that peaked at 2.5 terabytes per second (Tbps), according to Cloudflare, which described it as the largest attack it has seen in terms of bitrate.</p>
<p>The attack was aimed at a Minecraft server named Wynncraft and it involved UDP and TCP floods. However, the web security firm said it mitigated the attack, preventing it from causing any disruption to the game.</p>
<p>While this may have been a record-breaking attack for Cloudflare, Microsoft last year observed an attack that peaked at 3.47 Tbps and another that reached 3.25 Tbps.</p>
<p>Cloudflare this year also saw an attack reaching 26 million requests per second (RPS). The attack was noteworthy particularly for the fact that it was powered by a small botnet of only 5,000 devices. However, in terms of RPS, Google saw the biggest attack known to date, which peaked at 46 million RPS.</p>
<p>“The entire 2.5 Tbps attack lasted about 2 minutes, and the peak of the 26M rps attack only 15 seconds,” Cloudflare explained. “This emphasizes the need for automated, always-on solutions. Security teams can’t respond quick enough. By the time the security engineer looks at the PagerDuty notification on their phone, the attack has subsided.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1776036</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Aug 2022 12:19:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1776036</guid>
		<description><![CDATA[So RapperBot, What Ya Bruting For?
https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery
FortiGuard Labs has been tracking a rapidly evolving IoT malware family known as RapperBot since mid-June 2022. This family borrows heavily from the original Mirai source code, but what separates it from other IoT malware families is its built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai. In addition, recent samples show that its developers have started adding code to maintain persistence, which is rarely done in other Mirai variants. This provides threat actors with continued access to infected devices via SSH even after the device is rebooted or the malware has been removed.]]></description>
		<content:encoded><![CDATA[<p>So RapperBot, What Ya Bruting For?<br />
<a href="https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery" rel="nofollow">https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery</a><br />
FortiGuard Labs has been tracking a rapidly evolving IoT malware family known as RapperBot since mid-June 2022. This family borrows heavily from the original Mirai source code, but what separates it from other IoT malware families is its built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai. In addition, recent samples show that its developers have started adding code to maintain persistence, which is rarely done in other Mirai variants. This provides threat actors with continued access to infected devices via SSH even after the device is rebooted or the malware has been removed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/03/meet-linux-mirai-trojan-a-ddos-nightmare/comment-page-2/#comment-1776029</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Aug 2022 12:15:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47740#comment-1776029</guid>
		<description><![CDATA[New Linux malware brute-forces SSH servers to breach networks
https://www.bleepingcomputer.com/news/security/new-linux-malware-brute-forces-ssh-servers-to-breach-networks/ 
A new botnet called &#039;RapperBot&#039; is being used in attacks since mid-June 2022, focusing on brute-forcing its way into Linux SSH servers to establish a foothold on the device.
The researchers show that RapperBot is based on the Mirai trojan but deviates from the the original malware&#039;s normal behavior, which is uncontrolled propagation to as many devices as possible.
Instead, RapperBot is more tightly controlled, has limited DDoS capabilities, and its operation appears geared towards initial server access, likely to be used as stepping stones for lateral movement within a network.
Over the past 1.5 months since its discovery, the new botnet used over 3,500 unique IPs worldwide to scan and attempt brute-forcing Linux SSH servers.
Mirai-based, but different
RapperBot proved to be a Mirai fork, but with its own command and control (C2) protocol, unique features, and atypical (for a botnet) post-compromise activity.
&quot;Unlike the majority of Mirai variants, which natively brute force Telnet servers using default or weak passwords, RapperBot exclusively scans and attempts to brute force SSH servers configured to accept password authentication,&quot; explains the Fortinet report.
https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery]]></description>
		<content:encoded><![CDATA[<p>New Linux malware brute-forces SSH servers to breach networks<br />
<a href="https://www.bleepingcomputer.com/news/security/new-linux-malware-brute-forces-ssh-servers-to-breach-networks/" rel="nofollow">https://www.bleepingcomputer.com/news/security/new-linux-malware-brute-forces-ssh-servers-to-breach-networks/</a><br />
A new botnet called &#8216;RapperBot&#8217; is being used in attacks since mid-June 2022, focusing on brute-forcing its way into Linux SSH servers to establish a foothold on the device.<br />
The researchers show that RapperBot is based on the Mirai trojan but deviates from the the original malware&#8217;s normal behavior, which is uncontrolled propagation to as many devices as possible.<br />
Instead, RapperBot is more tightly controlled, has limited DDoS capabilities, and its operation appears geared towards initial server access, likely to be used as stepping stones for lateral movement within a network.<br />
Over the past 1.5 months since its discovery, the new botnet used over 3,500 unique IPs worldwide to scan and attempt brute-forcing Linux SSH servers.<br />
Mirai-based, but different<br />
RapperBot proved to be a Mirai fork, but with its own command and control (C2) protocol, unique features, and atypical (for a botnet) post-compromise activity.<br />
&#8220;Unlike the majority of Mirai variants, which natively brute force Telnet servers using default or weak passwords, RapperBot exclusively scans and attempts to brute force SSH servers configured to accept password authentication,&#8221; explains the Fortinet report.<br />
<a href="https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery" rel="nofollow">https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
