Security News > 2023 > June > Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks

The U.S. Cybersecurity and Infrastructure Security Agency has added a recently patched critical security flaw in Zyxel gear to its Known Exploited Vulnerabilities catalog, citing evidence of active exploitation.
Federal agencies in the U.S. are mandated to update their devices by June 21, 2023.
The disclosure also comes as Palo Alto Networks Unit 42 detailed a new wave of attacks mounted by an active Mirai botnet variant dubbed IZ1H9 since early April 2023.
The intrusions have been found to leverage multiple remote code execution flaws in internet-exposed IoT devices, including Zyxel, to ensnare them into a network for orchestrating distributed denial-of-service attacks.
It's worth noting that Mirai has spawned a number of clones since its source code was leaked in October 2016.
"IoT devices have always been a lucrative target for threat actors, and remote code execution attacks continue to be the most common and most concerning threats affecting IoT devices and linux servers," Unit 42 said.
News URL
https://thehackernews.com/2023/06/active-mirai-botnet-variant-exploiting.html
Related news
- New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors (source)
- DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns (source)
- New Mirai botnet behind surge in TVT DVR exploitation (source)
- Cloudflare mitigates record number of DDoS attacks in 2025 (source)
- DDoS attacks jump 358% compared to last year (source)
- Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacks (source)
- Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet (source)
- Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks (source)
- Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit (source)
- US indicts leader of Qakbot botnet linked to ransomware attacks (source)