One Article Review

Accueil - L'article:
Source Fortinet.webp Fortinet
Identifiant 463954
Date de publication 2018-02-02 20:34:59 (vue: 2018-02-02 20:34:59)
Titre Satori Adds Known Exploit Chain to Enslave Wireless IP Cameras
Texte Satori, a Mirai based IoT bot, has been one of the most actively updated exploits in recent months. It is believed that the hacker behind this bot is also the author of other Mirai variants, known as Okiru, and Masuta. FortiGuard Labs researchers recently observed a new Satori version that had added a known exploit chain (one which had been used in the past by the Persirai bot) to enable it to spread to vulnerable devices, particularly, wireless IP cameras that run a vulnerable custom version of the GoAhead web server.
Envoyé Oui
Condensat actively added adds also author based been behind believed bot cameras chain custom devices enable enslave exploit exploits fortiguard goahead hacker had has iot known labs masuta mirai months most new observed okiru one other particularly past persirai recent recently researchers run satori server spread updated used variants version vulnerable web which wireless
Tags
Stories Satori
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: