News

Several variants of the Gafgyt Linux-based botnet malware family have incorporated code from the infamous Mirai botnet, researchers have discovered.
IT researchers from Fortinet are monitoring an IoT botnet based on "Mirai" and called "Gayfemboy". It hides well.
A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices, as well as newly-discovered flaws in unknown IoT devices.
The threat actors behind the campaign make use of this capability to direct affected routers to download a MooBot malware payload. MooBot is a variant of the Mirai botnet malware that was first ...
Level 3 Threat Research has noted an uptick in activity by new IoT botnets backed by Mirai malware, with some attacks enlisting 100,000 hijacked devices.
Reporting counter-attacks A threat actor took advantage of this flaw to deploy Aquabotv3, a new variant of Mirai, arguably the most destructive botnet out there.
DDoS attacks are a very common tool in a hacking group’s arsenal. To remain secure, Doctor Web recommends keeping the TV updated, and only using trusted sources to download apps and patches.
A new botnet has been slowly growing over the past year by brute-forcing SSH logins and deploying cryptomining malware on Linux servers. The main bot client is based on the old Mirai worm whose ...
On April 12, cybersecurity researchers from FortiGuard Labs said the new distributed denial-of-service (DDoS) botnet, dubbed Enemybot, borrows modules from the infamous Mirai botnet's source code ...
Attackers exploiting nearly decade-old D-Link router vulnerabilities drove a sharp rise in botnet activity in 2024 through variants of the Mirai and Kaiten taking advantage of unpatched devices. The ...
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network’s Unit 42 team reports.