Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devices [arstechnica.com]
Mirai botnet returns and targets enterprise IoT devices [www.theinquirer.net]
Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices [thehackernews.com]
Sign of the times: Mirai botnet strain fine-tunes itself to infect digital signage, projectors [www.theregister.co.uk]
New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems [unit42.paloaltonetworks.com]
This new Mirai botnet uses 27 exploits (11 of which are new to Mirai) and has an expanded list of default Telnet creds.
— Catalin Cimpanu (@campuscodi) March 18, 2019
Report: https://t.co/Z6ef7Z54Dq pic.twitter.com/kQOTYJU76B
If you have an #IoT device that hasn't been patched or updated you better logon and disable the #WiFi b/c a new #Mirai #malware is coming your way!
— Consultants UnLimitd (@ConsultantsUnlt) March 19, 2019
Please take care so you aren't added to a #botnet to be used to attack others!https://t.co/LbUQcrTM4k
New exploits have been added to the Mirai IoT malware to include the targeting of wireless presentation systems and LG Supersign TVs.#malware #mirai #iot #botnet #cybersecurityhttps://t.co/OH0AAb1Ui3 https://t.co/KCsxBti69x
— Alan West (@musiccitymac) March 19, 2019
Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devices https://t.co/5aPPPaqho3 pic.twitter.com/haj4cMOjlK
— #AI (@AI__TECH) March 19, 2019
Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devices https://t.co/TJaHhTy3hM
— Aryeh Goretsky (@goretsky) March 19, 2019
New variant of Mirai takes aim at a new crop of IoT devices. https://t.co/YmiBBy4zgU via @arstechnica pic.twitter.com/PLros1vSDY
— Unit 42 (@Unit42_Intel) March 18, 2019
So sad. https://t.co/A55oIsuZpa If @minimsecure were widely deployed, attacks like this would be a thing of the past
— Jeremy Hitchcock (@jhitchco) March 18, 2019
Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices https://t.co/KKt5BDhqjL di @TheHackersNews
— Arturo Di Corinto (@arturodicorinto) March 19, 2019
Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices https://t.co/cUbTBMGKgQ
— Nicolas Krassas (@Dinosn) March 19, 2019
Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices #hacking https://t.co/MEA46QC6zh
— Claudia Martín (@CLAVDIAmartin) March 19, 2019
A new variant of #Mirai botnet gets a dozen new exploits to target #Enterprise IoT devices—eventually gaining control over larger bandwidth to carry out devastating #DDoS attacks.https://t.co/6e0Y1GQAy0
— Mohit Kumar (@unix_root) March 19, 2019
By @Swati_THN pic.twitter.com/HPwS89vAjC
A new variant of #Mirai botnet gets a dozen new exploits to target #Enterprise IoT devices—eventually gaining control over larger bandwidth to carry out devastating #DDoS attackshttps://t.co/S5jwmFU922 pic.twitter.com/zHIUPZXRcr
— Swati Khandelwal (@Swati_THN) March 19, 2019
#Mirai #Botnet variant adds dozen new exploits to target enterprise #IoT devices https://t.co/lW0g9858Zupic.twitter.com/moe3WYoDRa
— Perfect Privacy (@perfectprivacy) March 19, 2019
https://t.co/XX5ERVOvw1 - New Mirai Variant Targets Enterprise Wireless Presentation and Display Systems @PaloAltoNtwks pic.twitter.com/xLd4YffmxU
— René Bonvanie (@renebonvanie) March 19, 2019
Milestone achieved: two of my vulns are being actively exploited by Mirai; two of the lamest I have ever found.
— Pedro Ribeiro (@pedrib1337) March 19, 2019
Attackers don't care about sophistication if your stupid router can be owned with a lame unauth command injection.https://t.co/3ZWmmcXUqe
Our latest research on #Mirai uncovers new #exploits, brute-force capabilities in campaign that appears to target enterprise #IoT systems: https://t.co/dARYN6vl9u pic.twitter.com/7JDCZ2UnXv
— Unit 42 (@Unit42_Intel) March 18, 2019
This new Mirai botnet uses 27 exploits (11 of which are new to Mirai) and has an expanded list of default Telnet creds.
— Catalin Cimpanu (@campuscodi) March 18, 2019
Report: https://t.co/Z6ef7Z54Dq pic.twitter.com/kQOTYJU76B
Miraiのexploitが増えているようです。自分はまだ見覚えはないです。https://t.co/vZdWdtQoNe - New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems
— S-Owl (@Sec_S_Owl) March 19, 2019
今度はTVやプレゼンシステムの脆弱性を突く攻撃コードも詰め合わせパックの一部に組み込まれたらしい
— 鮭のきり身 (@sakemarisan) March 18, 2019
New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems https://t.co/2bSUhgxDHl
New Mirai Variant Targets Enterprise Wireless Presentation & Display Systemshttps://t.co/GsMEULf7gP
— DΛNIΞL ? (@hypoweb) March 18, 2019