Remove Cybercrime Remove IoT Remove Malware
article thumbnail

BadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warns

Security Affairs

malware has infected millions of IoT devices globally, creating a botnet used for cyber criminal activities, the FBI warns. botnet to exploit IoT devices on home networks, like streaming devices, projectors, and infotainment systems, mostly made in China. 3 ” reads the alert published by the FBI. ” BADBOX 2.0

IoT 145
article thumbnail

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris”

Krebs on Security

The assault came from “ Meris ,” the same new “Internet of Things” (IoT) botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer. Cloudflare recently wrote about its attack , which clocked in at 17.2

IoT 353
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zxyel Flaw Powers New Mirai IoT Botnet Strain

Krebs on Security

This week, security researchers said they spotted that same vulnerability being exploited by a new variant of Mirai , a malware strain that targets vulnerable Internet of Things (IoT) devices for use in large-scale attacks and as proxies for other cybercrime activity.

IoT 301
article thumbnail

New PumaBot targets Linux IoT surveillance devices

Security Affairs

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and mine crypto. Darktrace researchers discovered a new botnet called PumaBot targets Linux-based IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and mine cryptocurrency.

article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware.

DNS 139
article thumbnail

Giving a Face to the Malware Proxy Service ‘Faceless’

Krebs on Security

For the past seven years, a malware-based proxy service known as “ Faceless ” has sold anonymity to countless cybercriminals. The proxy lookup page inside the malware-based anonymity service Faceless. Recently, Faceless has shown ambitions beyond just selling access to poorly-secured IoT devices. Image: spur.us.

Malware 305
article thumbnail

Akira ransomware gang used an unsecured webcam to bypass EDR

Security Affairs

They found unsecured IoT devices, including webcams and a fingerprint scanner, using them to bypass security defenses and successfully deploy the ransomware. The IoT device was running a lightweight Linux OS, that was the perfect target for Akiras Linux ransomware variant. ” reads the report published by the S-RM team.