A new variant of the Mirai malware aimed at IoT devices has been discovered in the wild by security researchers from Palo Alto Networks.
The researchers first discovered this new strain earlier this year and now it is being used in a new IoT botnet focused on smart signage TVs and wireless presentation systems.
The botnet authors have spent a lot of time upgrading older versions of the Mirai malware with new exploits and according to Palo Alto Networks, this new Mirai botnet uses 27 exploits with 11 that are completely new to Mirai.
- New Mirai variant set to hit IoT devices
- Your Android device can be affected by a crypto-mining botnet
- "Most advanced" Torii botnet focused on IoT devices
The built-in list of standard credentials from Mirai has also been expanded by the botnet operator to make it easier for malware to access devices using standard passwords. In total, four new username and password combinations have been added according to a new report from Unit 42 of Palo Alto Network.
This new Mirai botnet is intended to infect IoT devices with exposed Telnet ports through standard credentials that remain unchanged by many hardware makers despite the security risks they pose.
While earlier botnets that use the Mirai malware are focused on routers, modems, security cameras ' s and DVR ' s, the latest is deliberately focused on smart signage TVs and wireless presentation systems, especially LG ' s Supersign TV ' s and the WePresent WiPG-1000 wireless presentation system.
Both exploits have been available online for some time, but this is the first time researchers have seen them being armed.
To prevent your devices from becoming a victim of the Mirai botnet, we recommend that you only use devices from trusted manufacturers and immediately change the default passwords on those devices.
- This is all you need to know about the IoT