An Arbor ASERT Team researcher spotted threat actors actively updating and customising the Mirai botnet source code that was leaked less than two weeks ago.
The firm’s principal engineer Roland Dobbins noted relatively high concentrations of Mirai nodes which were observed in China, Hong Kong, Macau, Vietnam, Taiwan, South Korea, Thailand, Indonesia, Brazil, and Spain that included updates to remove erroneous Mirai bot backdoor reference, added Dyn post-mortem link, and refined descriptive verbiage, according to a 26 October blog post.
View full story
ORIGINAL SOURCE: SC magazine
The post Researchers spot cyber-crooks actively upgrading Mirai botnet appeared first on IT SECURITY GURU.
from Researchers spot cyber-crooks actively upgrading Mirai botnet