Source |
Recorded Future |
Identifiant |
8394475 |
Date de publication |
2023-10-11 20:30:00 (vue: 2023-10-11 21:07:35) |
Titre |
Mises à jour de Botnet basées à Mirai \\ 'Arsenal of Exploits \\' on Routers, IoT Devices Mirai-based botnet updates \\'arsenal of exploits\\' on routers, IoT devices |
Texte |
Un botnet de logiciel malveillant basé à Mirai a élargi son arsenal de charge utile pour cibler agressivementDes routeurs et autres appareils orientés Internet, ont découvert des chercheurs.La variante, appelée IZ1H9, était observé Par des chercheurs de Fortinet exploitant les vulnérabilités dans des produits de neuf marques différentes, notamment D-Link, Netis, Sunhillo, Geutebruck, Yealink, Zyxel, TP-Link, KoENIX et Totolink.«Exploitation maximale» des vulnérabilités s'est produite
A Mirai-based malware botnet has expanded its payload arsenal to aggressively target routers and other internet-facing devices, researchers have discovered. The variant, called IZ1H9, was observed by researchers at Fortinet exploiting vulnerabilities in products from nine different brands, including D-Link, Netis, Sunhillo, Geutebruck, Yealink, Zyxel, TP-Link, Korenix and TOTOLINK. “Peak exploitation” of the vulnerabilities occurred |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
aggressively arsenal based botnet brands called devices different discovered expanded exploitation” exploiting exploits facing fortinet from geutebruck has have including internet iot its iz1h9 korenix link malware mirai netis nine observed occurred other payload products researchers routers sunhillo target totolink updates variant vulnerabilities yealink zyxel “peak |
Tags |
Malware
Vulnerability
|
Stories |
|
Move |
|