March 20, 2019 By David Bisson 2 min read

Researchers spotted a new Mirai variant targeting presentation systems and display devices commonly used by businesses.

Palo Alto Networks first observed the new variant in January 2019. The researchers quickly noted that the version of the infamous internet of things (IoT)/Linux botnet wasn’t just capable of targeting common IoT devices such as routers, IP cameras and network storage devices; it also came equipped with exploits for both WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs. Enterprises are the primary users of these technologies, which could signify that Mirai is adjusting its range of targets to include businesses.

Of the 27 exploits that came with this latest Mirai variant, 11 were new. The campaign used the compromised website of a Colombian business specializing in “electronic security, integration and alarm monitoring” to host its malicious payload.

The Latest Marai Variant to Hit the Botnet Scene

This is just the latest in a long string of Mirai variants to emerge in recent years. In March 2017, Imperva discovered a new version that had improved its ability to launch application-layer distributed denial-of-service (DDoS) attacks. Less than a year later, Infosecurity Magazine reported on the birth of Okiru, a Mirai member known for targeting ARC processors.

In the next six months, a cybercriminal released a link with the source code for seven new Mirai variants, as shared by Avast. Symantec spotted a version of the malware leveraging an open-source project as part of its attack campaigns a month later.

Strengthen Your Password Management and Incident Response

Security professionals should set up password managers to store strong, complex passwords for all corporate devices, including IoT assets. This should be part of a broader policy-based approach to password management across the organization. Lastly, security leaders should create an incident response team to help patch vulnerable IoT devices and disclose any security events involving those products should they occur.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today