Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

Potent new variant of the Mirai IoT malware has been discovered

Sponsered ads:
Read the latest IT news. Visit ItDirection.net. Updated several times daily.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.

March 29, 2017

We just learned today that hackers have created a potent new variant of the Mirai IoT malware that was reported by Internet-Security.ca on December 6, 2016.

This latest variant is capable of launching several application layer attacks rather than simply flooding targeted sites with some junk traffic.

The new botnet has already been used to hit an American college with a two-day-long attack in February, DDoS mitigation outfit Imperva Incapsula reports.

The public availability of the Mirai source code has led to hackers experimenting with different variants of the malware over recent months.

To be sure, the latest variant is far from the first such version but is nonetheless noteworthy because of its potency.

The original Mirai botnet infamously made numerous high-profile websites inaccessible as a result of an attack on DNS provider DynDNS in October 2016.

Web connected DVRs, CCTVs and routers and other IoT devices were hacked by malicious code that took advantage of default passwords (user: admin) to create a powerful attack vector.

In December 2016, another Mirai variant exploited a TR-069 network router protocol vulnerability to infect home routers. This isn't the first such attack and it most likely won't be the last. We'll keep you updated.

Sponsered ads:
Read the latest IT news. Visit ItDirection.net. Updated several times daily.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.


Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact
Copyright © Internet Security.ca    Terms of use    Privacy agreement    Legal disclaimer