• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new mirai botnet variant 'v3g4' exploiting 13 flaws to target

New Mirai Botnet Variant ‘V3G4’ Exploiting 13 Flaws to Target Linux and IoT Devices

You are here: Home / General Cyber Security News / New Mirai Botnet Variant ‘V3G4’ Exploiting 13 Flaws to Target Linux and IoT Devices
February 17, 2023

A new variant of the infamous Mirai botnet has been found leveraging numerous security vulnerabilities to propagate by itself to Linux and IoT products.

Observed in the course of the next 50 % of 2022, the new version has been dubbed V3G4 by Palo Alto Networks Device 42, which determined 3 distinct campaigns possible executed by the very same danger actor.

“As soon as the vulnerable units are compromised, they will be entirely controlled by attackers and develop into a part of the botnet,” Unit 42 scientists mentioned. “The risk actor has the functionality to use those gadgets to perform even more attacks, these as distributed denial-of-services (DDoS) attacks.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attacks mainly solitary out uncovered servers and networking products working Linux, with the adversary weaponizing as quite a few as 13 flaws that could direct to remote code execution (RCE).

Some of the noteworthy flaws relate to critical flaws in Atlassian Confluence Server and Knowledge Center, DrayTek Vigor routers, Airspan AirSpot, and Geutebruck IP cameras, among the others. The oldest flaw in the record is CVE-2012-4869, an RCE bug in FreePBX.

Pursuing a profitable compromise, the botnet payload is retrieved from a remote server using the wget and cURL utilities.

Mirai Botnet Variant

The botnet, in addition to examining if it’s presently functioning on the infected machine, also takes ways to terminate other competing botnets this sort of as Mozi, Okami, and Yakuza.

V3G4 additional packs a established of default or weak login credentials that it makes use of to have out brute-pressure attacks by way of Telnet/SSH and proliferate to other equipment.

It also establishes make contact with with a command-and-regulate server to await commands for launching DDoS attacks towards targets through UDP, TCP, and HTTP protocols.

“The vulnerabilities outlined higher than have less attack complexity than formerly observed variants, but they sustain a critical security effect that can guide to distant code execution,” the scientists mentioned.

To stave off this sort of attacks, it’s proposed that people apply required patches and updates as and when they turn out to be applicable, and secure the equipment with powerful passwords.

Identified this short article fascinating? Observe us on Twitter  and LinkedIn to examine extra special information we put up.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «how it professionals can switch careers into cyber security How IT professionals can switch careers into cyber security
Next Post: Data Leak Hits Thousands of NHS Workers Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.