Today: March 28, 2017, 2:07 pm
  
Computer & Technology

Digital Shadows Report Reveals that the Mirai Botnet Isn’t Going Away

Digital Shadows Report highlights the inherent vulnerability of basing network infrastructure around centralized DNS providers

 

PR-Inside.com: 2016-12-26 07:59:27
Dubai, UAE, December 26, 2016: Digital Shadows, a provider of cyber situational awareness, released its new report Mirai and The Future, Forecasting the DDoS Landscape in 2017. The emergence of the Mirai botnet - a type of malware that automatically finds Internet of Things (IoT) devices to infect - earlier this year was hailed as a major development in malware but according to the report, this could be a tip of the iceberg as cybercriminals rush to adapt and develop the original Mirai code.


Mirai translates from Japanese as the ‘future’ and if claims by actors such as BestBuy and Popopret are true, the total number of IoT devices infected with Mirai has increased since this malware variant was publicly released on September 30, 2016.

“We know criminals move quickly to exploit new malware and techniques and find new ways to monetize them for profit,” said Rick Holland, VP Strategy at Digital Shadows. “So we can see a time when DDoS extortion actors have succeeded in creating new models for generating a ransom payment. Instead of solely relying on a target company, groups will use social media platforms to crowdsource the ransom payment from users who are dependent on the service,” Holland said.

Mirai botnet is part of an emerging global trend of large and complex cyberattacks that are difficult to spot and even more difficult to prevent in an increasingly digitalised world. Countries in the Middle are witnessing significant economic and technological transformation due to growing business opportunities in large industries such as banking, financial services, insurance (BFSI) and the region’s dominance in heavy industries such as oil and gas.

“As organisations and individuals in the Middle East and especially the UAE and Saudi Arabia turn increasingly towards internet enabled devices, it is even more critical there is better awareness of the problem,” said Holland. “Businesses selling Internet enables devices have to be aware of the risks and do more to secure these devices. We are consumers, need to ensure we use the same degree of Cybersecurity scrutiny and awareness as we do surfing the web from a PC.”

The Mirai botnet first discovered earlier in the summer utilizes ‘Internet-of-Things’ (IoT) devices, such as Internet-enabled digital video recorders (DVRs), surveillance cameras, and other Internet-enabled embedded devices, and has been utilized by attackers to launch multiple high-profile, high-impact DDoS attacks against various Internet properties and services, including Talk Talk and the Post Office in the UK.

There are three main motivations behind those who use DDoS as a tactic:

1. Online protest, typically planned, orchestrated and launched by hacktivist groups. These campaigns have targeted specified industries and geographies, both in the private and public sector.

2. Financial profitability, a significant motivation for a number of actors, such as extortion actors who use the threat of DoS or DDoS in return for a ransom payment. This is largely, although not exclusively, the preserve of the cybercriminal. DDoS attacks may also be used as a distraction for network intrusions conducted for profit.

3. Political gain, launched by nation state affiliated actors.

Mirai has proven itself to be remarkably flexible and adaptable as a result of which hackers can develop different strains of Mirai that can take over new vulnerable IoT devices and increase the population Mirai botnets can draw on. The report suggests that 2017 is likely to see a range of new Mirai variants utilizing and adapting the original source code to target organisations and governments, by hacktivists, cybercriminals motivated by financial gain through extortion and politically motivate actors.

Press Information
Digital Shadows
Conrad Offices, 19th Floor,


Sheikh Zayed Road, Dubai

Sharon Divan
PR
+97143827880
email
www.oakconsulting.biz/


# 595 Words
Related Articles
More From The Author
Cyber security current and emerging trends for [..]
2016 saw a huge number and variety of cyberattacks, ranging from a high-profile DDoS using hijacked Internet-facing security cameras [..]
Bulwark Signs Distribution Agreement With Mimecast
Dubai, UAE, December 18, 2016: Bulwark, the UAE based and specialized Value-Added Distributor, announced that they have signed [..]
Top 12 Tips for staying safe online [..]
As the popularity of online shopping increases in Kuwait, so does the likelihood of falling foul of cybercrooks, not necessarily [..]
Cybersecurity/Cyber threats: 2017 the year of...
As we approach the year-end attention of course turns to what we can expect to see in 2017 and what [..]
Mimecast Chief Security Strategist Spoke at RSA [..]
Dubai, UAE – December 9, 2016 – Mimecast Limited (NASDAQ: MIME), a leading email and data security company, today announced [..]
 
More From Computer & Technology
Baselworld 2017 - Tappy Announces Leading Watch [..]
Tappy is a pioneer in contactless wearable payments and a Global Wearable Program Partner of many leading banks and financial [..]
WebCreationUK partners with TrustSpot to add customer [..]
London, UK - 21 March 2017 WebCreationUK partners with TrustSpot to add customer Review service to all new clients. WebCreationUK, [..]
Latest issue of Nanotech Magazine examines the [..]
Issue 45 of Nanotech Magazine (www.nanotechmag.com ), the world’s only monthly business magazine for nanotechnology products and [..]
Barclaycard Signs Two bPay Partners to Embed [..]
LONDON, Feb 27 - Barclaycard has agreed two new partnerships that will see its bPay payment technology embedded into high [..]
V3CUBE – A famous uber clone company [..]
A company that started in 2005 with just three members in a little dingy little basement with three tables, and [..]

Disclaimer: If you have any questions regarding information in this press release please contact the company added in the press release. Please do not contact pr-inside. We will not be able to assist you. PR-inside disclaims the content included in this release.