Security researchers discovered a new variant of Mirai malware known as Miori that is targeting internet of things (IoT) devices to integrate into a larger botnet and launch distributed denial-of-service (DDoS) attacks.

Trend Micro noted that the threat, which was first identified in early December, takes advantage of an exploit in the ThinkPHP programming framework. The remote code execution (RCE) vulnerability allows threat actors to infect machines based on the Linux operating system and execute Miori, which then generates a notification on the victim’s console.

Once attackers verify that a system has been infected through their command-and-control (C&C) server, they utilize the Telnet protocol and take advantage of weak or commonly used passwords to conduct brute-force attacks on other IP addresses. In a screenshot, researchers looking into Miori revealed some of the passwords that were used during recent attack campaigns, which included admin123, support, root and even default.

Miori Is Just the Latest in the Mirai Malware Family

Researchers noted that Miori is just one of many variations of Mirai discovered since the original malware made its debut. In September 2016, for example, millions of users temporarily lost internet access after the malware targeted Dyn, which provides a significant portion of the internet’s backbone. Similar attacks based on Mirai have been launched against major telecommunications operators in Germany and the U.K. over the past few months.

Besides Miori, other Mirai offspring include Shinoa, APEP and IZ1H9, which use the same RCE exploit to find and infiltrate victims’ open source-based machines.

How to Defend Against Miori, Mirai and More

Given the many different versions of Mirai, coupled with the growing number of IoT devices in offices and homes, organizations can no longer afford to employ weak password protection in 2019. As security experts have noted, some threat actors even take advantage of password databases called dumps, which collect commonly used credentials to make the work of attackers even easier.

Besides regularly updating passwords, organizations should also think about requiring passwords that are 12 characters or longer, rather than the typical eight characters. Backing up passwords, using a password manager and utilizing multifactor authentication (MFA) tools that add an additional layer of security onto connected devices can also help defend against emerging threats.

Sources: Trend Micro, Wired

More from

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities. Figure 1 — Exploitation timeline However, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack…

OneNote, Many Problems? The New Phishing Framework

There are plenty of phish in the digital sea, and attackers are constantly looking for new bait that helps them bypass security perimeters and land in user inboxes. Their newest hook? OneNote documents. First noticed in December 2022, this phishing framework has seen success in fooling multiple antivirus (AV) tools by using .one file extensions, and January 2023 saw an attack uptick as compromises continued. While this novel notes approach will eventually be phased out as phishing defenses catch up,…

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

LastPass Breaches Cast Doubt on Password Manager Safety

In 2022, LastPass suffered a string of security breaches which sparked concern among cyber professionals and those impacted by the intrusions. Some called into question the way LastPass handled and responded to the incident. In addition, the situation ignited a wider conversation about the risks linked to utilizing password managers. A password manager helps users generate strong passwords and safeguards them within a digital locker. A master password secures all data, which enables users to conveniently access all their passwords…