Logo

DOSarrest Vulnerability Testing and Optimization
Navigation
  • Home

New Mirai variant set to hit IoT devices

on January 17, 2018 |
DDoS DDoS Attack Specialist DDoS Attacks Denial of Service Stop DDoS Stop DDoS Attacks

Okiru aimed specifically at ARC-based devices

Users of ARC-based IoT devices have been warned about potential distributed denial of service (DDoS) attacks from a new variant of the notorious Mirai botnet.

The vulnerability, a variation of the original Mirai, has been dubbed Okiru and is claimed to be the first variation of Mirai to be aimed specifically at ARC devices.

Argonaut RISC Core (ARC) processors are one of the most commonly-used in the world and are particularly widely used in IoT devices.

Long history

The botnet was discovered by the security  research team known as Malware Must Die, although it was security researcher ‘Odisseus’ who brought news of the attack to wider attention when he tweeted about the severity of the attack.

Mirai has a long, infamous history in attacking IoT devices most notoriously the attack on Dyn servers in October 2016. Odisseus noted that, no sooner had Okiru been identified, than it was responsible for a denial of service attack on a security website.

Source: http://www.techradar.com/news/new-variant-mirai-set-to-hit-iot-devices

Share this story:
  • tweet

Recent Posts

  • Link11 Discovers Record Number of DDoS Attacks in First Half of 2021

    July 15, 2021 - 0 Comment
  • A New Wave of DDoS Extortion Campaigns by Fancy Lazarus

    June 16, 2021 - 0 Comment
  • ‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

    June 12, 2021 - 0 Comment
Comments are closed.
DOSarrest ad

Keep updated with the latest DDoS Attacks

RSSSubscribe
  • Home
  • Latest News
  • Contact
  • Sitemap
© Copyright 2013. All Rights Reserved. Web Development by: 6folds Marketing