Security News > 2023 > February > New Mirai malware variant infects Linux devices to build DDoS botnet

A new Mirai botnet variant tracked as 'V3G4' targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS attacks.
The malware spreads by brute-forcing weak or default telnet/SSH credentials and exploiting hardcoded flaws to perform remote code execution on the target devices.
Once a device is breached, the malware infects the device and recruits it into its botnet swarm.
The botnet also attempts to terminate a set of processes from a hardcoded list, which includes other competing botnet malware families.
Finally, compromised devices are issued DDoS commands directly from the C2, including TCP, UDP, SYN, and HTTP flooding methods.
As always, the best way to protect your devices from Mirai-like infections is to change the default password and install the latest security updates.
News URL
Related news
- New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems (source)
- Vo1d malware botnet grows to 1.6 million Android TVs worldwide (source)
- New Eleven11bot botnet infects 86,000 devices for DDoS attacks (source)
- Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems (source)
- Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year (source)
- Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers (source)
- New Mirai botnet behind surge in TVT DVR exploitation (source)