Top
Mirai leveraging Aboriginal Linux to target multiple platforms – ANITH
fade
211455
post-template-default,single,single-post,postid-211455,single-format-standard,eltd-core-1.1.1,flow child-child-ver-1.0.0,flow-ver-1.3.6,eltd-smooth-scroll,eltd-smooth-page-transitions,ajax,eltd-blog-installed,page-template-blog-standard,eltd-header-standard,eltd-fixed-on-scroll,eltd-default-mobile-header,eltd-sticky-up-mobile-header,eltd-dropdown-default,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Mirai leveraging Aboriginal Linux to target multiple platforms

Mirai leveraging Aboriginal Linux to target multiple platforms

The Mirai botnet hasn’t gone away, you don’t hear about it much, but the code has been constantly updated and maintained. Recently, Symantec’s Dinesh Venkatesan discovered a command and control (C&C) server hosting various types of malware, each one targeted for a specific platform.

In October of 2016, the Mirai botnet was used in attacks against Dyn Inc., knocking out internet service to most of the east coast in the United States, but it was later determined to be a variant of Mirai in the Dyn Inc. attack, it wasn’t the same set of Mirai bots used to target OVH and Brian Krebs the month prior.

To read this article in full, please click here

Source link

Anith Gopal
No Comments

Post a Comment

1 + four =

This site uses Akismet to reduce spam. Learn how your comment data is processed.