article thumbnail

Updated Kmsdx botnet targets IoT devices

Security Affairs

Researchers spotted an updated version of the KmsdBot botnet that is now targeting Internet of Things (IoT) devices. The Akamai Security Intelligence Response Team (SIRT) discovered a new version of the KmsdBot botnet that employed an updated Kmsdx binary targeting Internet of Things (IoT) devices.

IoT 95
article thumbnail

XMR crypto miner switches from arm IoT devices to X86/I686 Intel servers

Security Affairs

Akamai researcher Larry Cashdollar reported that a cryptocurrency miner that previously hit only Arm-powered IoT devices it now targeting Intel systems. The researchers revealed that one of his honeypots was hit by this IoT malware that targets Intel machines running Linux. “This one seems to target enterprise systems.”

IoT 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Torii botnet, probably the most sophisticated IoT botnet of ever

Security Affairs

Avast spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed. Security researchers spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed.

IoT 89
article thumbnail

Apple M1 Chips face LockBit Ransomware threat in development

CyberSecurity Insiders

Their attention has now turned to Apple’s ARM-based processors used in Macs and iPads, and they have begun developing a new architecture to target these devices. Furthermore, the anonymity of cryptocurrency transactions, once regarded as a refuge for criminals, has significantly diminished.

article thumbnail

How to make sure your digital transformation is secure

CyberSecurity Insiders

Technologies such as IoT, cloud computing, edge computing, and AI have the ability to drastically improve the service and operations of any business. A sound cybersecurity architecture requires a strong foundation in order to anchor the keys and passwords embedded in our digital networks in place – this approach is called security-by-design.

article thumbnail

New HEH botnet wipes devices potentially bricking them

Security Affairs

Researchers from from Netlab, the network security division of Chinese tech giant Qihoo 360, have discovered a new botnet, tracked as HEH, that contains the code to wipe all data from infected systems, such as routers, IoT devices, and servers. In the current version, each node cannot send control command to its peers.

article thumbnail

Developer Interest in Cybersecurity Topics Grows as Data Breaches Persist, O’Reilly Analysis Reveals

CyberSecurity Insiders

Between last year’s high-profile incidents involving ransomware, supply chain attacks, and the exploitation of critical systems vulnerabilities and the new focus on cryptocurrency theft, it’s likely that interest in cybersecurity topics will continue to climb in 2022 and beyond.