Three men have pleaded guilty in US federal court to charges related to the creation of the Mirai Internet of Things botnet malware, variants of which have been used in a series of DDoS attacks since 2016.
The individual, or people, behind the BrickerBot malware attacks have decided to hang up their mouse and keyboard after claiming to have locked more than 10 million supposedly unsecure Internet of Things devices.
A massive new IoT botnet dubbed Satori has emerged, which security researchers fear, can launch crippling attacks at any time. According to the IBT the botnet has already infected more than 280,000 IP addresses in just 12 hours.
A new strain of the Mirai IoT malware has been discovered following the publication of exploit code targeting networking equipment.
IoT devices in the dock as DDoS stages a resurgence, but stealth and sophistication also on the rise.
Only by understanding the true nature of threats and the vulnerabilities they exploit can we hope to prevent them says Susan Bowen, adding, the reason why Mirai IOT attacks were so effective is the lack any form of embedded security.
In Case You Missed It: Skills gap real? Mirai hits DT; GDPR ignored; £14.5m cyber-centre; ApplePay vulnerable to two threats
A new report from the Institute of Critical Infrastructure Technology has placed Mirai as one of the most insidiously profound threats of recent memory, offering a "quantum leap" to even unsophisticated attackers
Researchers have confirmed that it was a variant form of Mirai that was used to try and turn nearly a million Deutsche Telekom customers routers into a botnet over the weekend.
A Mirai botnet-fueled distributed denial of service (DDoS) attack reportedly incapacitated internet operations across the West African coastal nation of Liberia earlier this week.
The country of Liberia has been attacked by the Mirai botnet, with security experts predicting that it is being used for experimenting with different attack methods.