New Mirai Variant Targets Business Presentation and Display Devices

Researchers spotted a new Mirai variant targeting presentation systems and display devices commonly used by businesses.

Palo Alto Networks first observed the new variant in January 2019. The researchers quickly noted that the version of the infamous internet of things (IoT)/Linux botnet wasn’t just capable of targeting common IoT devices such as routers, IP cameras and network storage devices; it also came equipped with exploits for both WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs. Enterprises are the primary users of these technologies, which could signify that Mirai is adjusting its range of targets to include businesses.

Of the 27 exploits that came with this latest Mirai variant, 11 were new. The campaign used the compromised website of a Colombian business specializing in “electronic security, integration and alarm monitoring” to host its malicious payload.

The Latest Marai Variant to Hit the Botnet Scene

This is just the latest in a long string of Mirai variants to emerge in recent years. In March 2017, Imperva discovered a new version that had improved its ability to launch application-layer distributed denial-of-service (DDoS) attacks. Less than a year later, Infosecurity Magazine reported on the birth of Okiru, a Mirai member known for targeting ARC processors.

In the next six months, a cybercriminal released a link with the source code for seven new Mirai variants, as shared by Avast. Symantec spotted a version of the malware leveraging an open-source project as part of its attack campaigns a month later.

Strengthen Your Password Management and Incident Response

Security professionals should set up password managers to store strong, complex passwords for all corporate devices, including IoT assets. This should be part of a broader policy-based approach to password management across the organization. Lastly, security leaders should create an incident response team to help patch vulnerable IoT devices and disclose any security events involving those products should they occur.

Contributor'photo

David Bisson

Contributing Editor

David Bisson is an infosec news junkie and security journalist. He works as Contributing Editor for Graham Cluley...