January 2, 2019 By Shane Schick 2 min read

Security researchers discovered a new variant of Mirai malware known as Miori that is targeting internet of things (IoT) devices to integrate into a larger botnet and launch distributed denial-of-service (DDoS) attacks.

Trend Micro noted that the threat, which was first identified in early December, takes advantage of an exploit in the ThinkPHP programming framework. The remote code execution (RCE) vulnerability allows threat actors to infect machines based on the Linux operating system and execute Miori, which then generates a notification on the victim’s console.

Once attackers verify that a system has been infected through their command-and-control (C&C) server, they utilize the Telnet protocol and take advantage of weak or commonly used passwords to conduct brute-force attacks on other IP addresses. In a screenshot, researchers looking into Miori revealed some of the passwords that were used during recent attack campaigns, which included admin123, support, root and even default.

Miori Is Just the Latest in the Mirai Malware Family

Researchers noted that Miori is just one of many variations of Mirai discovered since the original malware made its debut. In September 2016, for example, millions of users temporarily lost internet access after the malware targeted Dyn, which provides a significant portion of the internet’s backbone. Similar attacks based on Mirai have been launched against major telecommunications operators in Germany and the U.K. over the past few months.

Besides Miori, other Mirai offspring include Shinoa, APEP and IZ1H9, which use the same RCE exploit to find and infiltrate victims’ open source-based machines.

How to Defend Against Miori, Mirai and More

Given the many different versions of Mirai, coupled with the growing number of IoT devices in offices and homes, organizations can no longer afford to employ weak password protection in 2019. As security experts have noted, some threat actors even take advantage of password databases called dumps, which collect commonly used credentials to make the work of attackers even easier.

Besides regularly updating passwords, organizations should also think about requiring passwords that are 12 characters or longer, rather than the typical eight characters. Backing up passwords, using a password manager and utilizing multifactor authentication (MFA) tools that add an additional layer of security onto connected devices can also help defend against emerging threats.

Sources: Trend Micro, Wired

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today