Security News > 2023 > November > Mirai malware infects routers and cameras for new botnet

Akamai has uncovered two zero-day bugs capable of remote code execution, both being exploited to distribute the Mirai malware and built a botnet army for distributed denial of service attacks.
Because the security holes aren't plugged yet, Akamai's Security Intelligence Response Team did not name the brands or the affected devices.
The camera vendor produces about 100 network video recorder, DVR, and IP products, and although the zero-day targets one specific model, Akamai says a sub-variant model of the device is "Likely" also vulnerable.
"The feature being exploited is a very common one, and it's possible there is code reuse across product line offerings," according to the Akamai Security Intelligence Response Team's advisory.
Akamai's researchers monitor botnet activity using a global network of honeypots but didn't spot the new Mirai variant until October - and didn't know which devices it was targeting until November 9.
It primarily uses older JenX Mirai code, although Akamai noted some samples it spotted were linked to the hailBot Mirai variant.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/11/23/zeroday_routers_mirai_botnet/
Related news
- New Mirai botnet behind surge in TVT DVR exploitation (source)
- Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet (source)
- Police dismantles botnet selling hacked routers as residential proxies (source)
- ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams (source)
- Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit (source)
- Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor (source)
- 8,000+ Asus routers popped in 'advanced' mystery botnet plot (source)