Executive Summary The Hide ‘N Seek botnet was first discovered in January 2018 and is known for its unique use of Peer-to-Peer communication between bots. Since its discovery, the malware family has seen a couple of upgrades, from the addition of persistence and new exploits, to targeting Android devices via the Android Debug Bridge (ADB).
Our researchers have discovered a new Mirai variant that uses 8 new vulnerabilities and targets new IoT devices.
Unit 42 discovers new samples of Mirai compiled for additional processors, Altera Nios II, OpenRISC, Tensilica Xtensa, and Xilinx MicroBlaze, potentially increasing the DDoS firepower of Mirai.
This time every year, people all over the world get new devices. Regardless of what holiday(s) you may (or may not) celebrate, the end of the year is a time for people to give and receive some of the latest devices to come on to the market. Nothing spoils a new gadget more than having
Unit 42 has uncovered new variants of the well-known IoT botnets Mirai and Gafgyt.
Unit 42 discovers attackers taking control of home routers to attack websites. Learn more about this type of attack and what you should do to prevent it.
Unit 42 documents the emergence of three malware campaigns built on publicly available source code for the Mirai and Gafgyt malware families that incorporate multiple known exploits affecting Internet of Things (IoT) device.
Unit 42 researchers outline the evolution of Satori, a malware family targeting zero-day vulnerabilities in IoT devices
Unit 42 researchers have identified a new variant of the IoT/Linux botnet “Tsunami”, which we are calling “Amnesia”.
Unit 42 researchers uncover aggressive adware abusing third-party DroidPlugin framework on Android.
Unit 42 researchers discover Google Play apps infected with malicious IFrames.