Security News > 2022 > April > Beastmode botnet boosts DDoS power with new router exploits
A Mirai-based distributed denial-of-service botnet tracked as Beastmode has updated its list of exploits to include several new ones, three of them targeting various models of Totolink routers.
The authors of DDoS botnets did not waste any time and added these flaws to their arsenal to take advantage of the opportunity window before Totolink router owners applied the security updates.
By taking control of the vulnerable routers, Beastmode has access to hardware resources that allow it to launch DDoS attacks.
The botnet operators make money either by selling DDoS services or by launching attacks against firms and asking for a ransom to stop.
Once this happens, the malware downloads a shell script that registers the captured device on the botnet and sets it up for various DDoS attack types.
To prevent Mirai variants from taking control of your router or IoT devices, make sure to apply the available security updates that fix the vulnerabilities mentioned above.
News URL
Related news
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet (source)
- New botnet exploits vulnerabilities in NVRs, TP-Link routers (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- New Mirai botnet targets industrial routers with zero-day exploits (source)
- New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks (source)
- Juniper warns of Mirai botnet targeting Session Smart routers (source)
- Juniper warns of Mirai botnet scanning for Session Smart routers (source)
- FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks (source)
- 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials (source)