136:
57:
470:(IoT) in the internet, and three of them were designed to target specific vulnerabilities by using exploit proof of concept, without launching brute-forcing attack to the default credential authentication. In the same month it was published a report of infection campaign of Mirai malware to Android devices through the Android Debug Bridge on TCP/5555, an optional feature in the Android operating system, though it was discovered that this feature appears to be enabled on some Android phones.
437:) is the second-most-popular embedded 32 bit processor, shipped in more than 1.5 billion products per year, including desktop computers, servers, radio, cameras, mobile, utility meters, televisions, flash drives, automotive, networking devices (smart hubs, TV modems, routers, wifi) and Internet of Things. Only a relatively small number of ARC-based devices run Linux and are therefore exposed to Mirai.
256:
560:. The same user later claimed in an interview with a New Jersey-based blogger that they had lied about being affiliated with the university and that the attacks were being funded by an anonymous client. Security researcher Brian Krebs later alleged the user was indeed a student at Rutgers University and that the latter interview was given in an attempt to distract investigators.
343:, which may involve simply turning the device off and after a short wait turning it back on. After a reboot, unless the login password is changed immediately, the device will be reinfected within minutes. Upon infection Mirai will identify any "competing" malware, remove it from memory, and block remote administration ports.
544:
caused course registration and other services to become unavailable during critical times in the academic semester. The university reportedly spent $ 300,000 in consultation and increased the cyber-security budget of the university by $ 1 million in response to these attacks. The university cited the
450:
On 26 January 2018, two similar Mirai variant botnets were reported, the more modified version of which weaponizes EDB 38722 D-Link router's exploit to enlist further vulnerable IoT devices. The vulnerability in the router's Home
Network Administration Protocol (HNAP) is utilized to craft a malicious
363:
which monitors the IP address of incoming requests and filters or sets up a block if it identifies an abnormal traffic pattern, for example, if too many requests come from a particular IP address. Other reasons include to be able to marshall more bandwidth than the perpetrator can assemble alone, and
473:
At the end of 2018, a Mirai variant dubbed "Miori" started being spread through a remote code execution vulnerability in the ThinkPHP framework, affecting versions 5.0.23 to 5.1.31. This vulnerability is continuously being abused by the further evolved Mirai variants dubbed as "Hakai" and "Yowai" in
462:
Between May and June 2018, another variant of Mirai, dubbed as "Wicked", has emerged with added configurations to target at least three additional exploits including those affecting
Netgear routers and CCTV-DVRs. Wicked scans ports 8080, 8443, 80, and 81 and attempts to locate vulnerable, unpatched
454:
In March 2018, a new variant of Mirai, dubbed as "OMG", has emerged to surface with added configurations to target vulnerable IoT devices and turning them into proxy servers. New firewall rules that allow traffic to travel through the generated HTTP and SOCKS ports were added configurations to the
351:
TCP ports 23 and 2323”. If an IoT device responds to the probe, the attack then enters into a brute-force login phase. During this phase, the attacker tries to establish a telnet connection using predetermined username and password pairs from a list of credentials. Most of these logins are default
643:
Researchers later pointed to the handle name "Nexus Zeta" as responsible for the author of new variants of Mirai (dubbed as Okiru, Satori, Masuta and PureMasuta), and on August 21, 2018, an
American grand jury indicted Kenneth Currin Schuchman, 20, aka Nexus Zeta, of knowingly causing the
589:
and produced by
Arcadyan, were crashed due to failed TR-064 exploitation attempts by a variant of Mirai, which resulted in Internet connectivity problems for the users of these devices. While TalkTalk later patched their routers, a new variant of Mirai was discovered in TalkTalk routers.
628:. On December 13, 2017, Paras Jha, Josiah White, and Dalton Norman entered a guilty plea to crimes related to the Mirai botnet. The trio assisted the government with other cybersecurity investigations, and were sentenced to probation and community service without imprisonment.
334:
Mirai then identifies vulnerable IoT devices using a table of more than 60 common factory default usernames and passwords, and logs into them to infect them. Infected devices will continue to function normally, except for occasional sluggishness, and an increased use of
451:
query to exploited routers that can bypass authentication, to then cause an arbitrary remote code execution. The less modified version of Mirai is called "Masuta" (after the
Japanese transliteration of "Master"), while the more modified version is called "PureMasuta".
609:
posted an article on his blog, Krebs on
Security, where he disclosed the name of the person who he believed to have written the malware. Krebs stated that the likely real-life identity of Anna-senpai (named after Anna Nishikinomiya, a character from
639:
banks," according to the NCA. He has been extradited from
Germany to the UK according to the same report. Kaye has also pleaded guilty in court on hijacking more than 900,000 routers from the network of Deutsche Telekom.
346:
Victim IoT devices are identified by “first entering a rapid scanning phase where it asynchronously and “statelessly” sent TCP SYN probes to pseudo-random IPv4 addresses, excluding those in a hard-coded IP blacklist, on
1610:
644:
transmission of a program, information, code, and commands, and as result of such conduct intentionally causing damage without authorization to protected computers, according to the indictment filed in
1585:
1251:
1527:
421:
On 14 January 2018, a new variant of Mirai dubbed “Okiru”, the
Japanese word for "get up," already targeting popular embedded processor like ARM, MIPS, x86, PowerPC and others was found targeting
2001:
1396:
1753:
1695:
1779:
1556:
2218:
1339:
631:
Daniel Kaye, 29, also known as alias "BestBuy", "Popopret" or "Spiderman", has been accused of "using an infected network of computers known as the Mirai botnet to attack and blackmail
545:
attacks among its reasons for the increase in tuition and fees for the 2015–2016 school year. A person under the alias "exfocus" claimed responsibility for the attacks, stating in a
352:
usernames and passwords from the IoT vendor. If the IoT device allows the Telnet access, the victim's IP, along with the successfully used credential is sent to a collection server.
745:
570:'s Internet infrastructure in November 2016. According to computer security expert Kevin Beaumont, the attack appears to have originated from the actor which also attacked Dyn.
1602:
1059:
1809:
1500:
1369:
1281:
2083:
1881:
1665:
862:
2191:
1028:
540:
from 2014 to 2016, which left faculty and students on campus unable to access the outside
Internet for several days at a time. Additionally, a failure of the university's
1184:
2056:
2682:
2702:
513:, many of which were still using their default usernames and passwords. These attacks resulted in the inaccessibility of several high-profile websites, including
2137:
1903:
1450:
1582:
1243:
1970:
1851:
1523:
1153:
955:
1720:
1423:
826:
795:
1993:
1392:
2164:
616:), the author of Mirai, was actually an Indian-American Paras Jha, the owner of a DDoS mitigation service company ProTraf Solutions and a student of
1745:
1115:
1687:
768:
1775:
355:
There are a large number of IoT devices which use default settings, making them vulnerable to infection. Once infected, the device will monitor a
2394:
1552:
1207:
1085:
2368:
2214:
1335:
1312:
3316:
1635:
2854:
2672:
928:
2662:
2616:
737:
1051:
2110:
897:
1801:
1496:
1365:
1273:
200:. According to a chat log between Anna-senpai (the malware's original author) and Robert Coelho, Mirai was named after the 2011 TV
2079:
1877:
1657:
3857:
3847:
3250:
1018:
866:
2187:
3852:
1176:
2431:
2279:
2035:
2052:
2786:
1832:
463:
IoT devices running on those ports. Researchers suspect the same author created the Wicked, Sora, Owari, and Omni botnets.
371:(IoT) devices threat has not been stopped after the arrest of the actors. Some believe that other actors are utilizing the
185:
2244:
533:
and many others. The attribution of the Dyn attack to the Mirai botnet was originally reported by Level 3 Communications.
466:
In early July 2018 it was reported at least thirteen versions of Mirai malware has been detected actively infecting Linux
3200:
2667:
1994:"Justice Department Announces Charges And Guilty Pleas In Three Computer Crime Cases Involving Significant Cyber Attacks"
1940:
1232:
Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security
Symposium (USENIX Security 2017) (2017)
328:
1962:
3837:
3334:
2817:
2595:
2361:
2133:
3340:
2866:
2827:
2462:
1911:
1446:
985:
390:
to many more IoT devices. The detail of the recent progress of these variants is listed in the following paragraphs.
359:
which indicates the target of an attack. The reason for the use of the large number of IoT devices is to bypass some
298:
1716:
563:
Staff at Deep Learning Security observed the steady growth of Mirai botnets before and after the 21 October attack.
556:
that the user was a student at the school and the DDoS attacks were motivated by frustrations with the university's
418:
related exploits on routers web interface, CVE-2014–8361 and CVE-2017–17215. This Mirai version is called "Satori".
3400:
3346:
2921:
2812:
2641:
280:
94:
3394:
1855:
1145:
2748:
2585:
2487:
621:
963:
3797:
2807:
2580:
2549:
541:
2687:
2600:
2399:
2389:
2354:
1419:
181:
834:
803:
3872:
3561:
2951:
2738:
2677:
2636:
2534:
645:
625:
455:
Mirai code. Once these ports are open to traffic, OMG sets up 3proxy – open-source software available on a
324:
36:
3298:
2160:
620:. In an update to the original article, Paras Jha responded to Krebs and denied having written Mirai. The
3056:
2791:
2554:
1107:
2891:
772:
3745:
3086:
2941:
2733:
2626:
2570:
111:
2492:
1211:
3226:
3195:
2822:
2272:
2245:"The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story"
1081:
271:
74:
2781:
135:
3364:
2931:
2849:
2755:
2728:
1631:
1304:
1055:
684:
593:
A British man suspected of being behind the attack was arrested at Luton Airport, according to the
242:. Since the source code was published, the techniques have been adapted in other malware projects.
70:
1878:"German leaders angry at cyberattack, hint at Russian involvement | Germany | DW.COM | 29.11.2016"
3520:
3184:
2657:
2590:
2436:
1524:"ThinkPHP Remote Code Execution Vulnerability Used To Deploy Variety of Malware (CVE-2018-20062)"
3867:
3081:
2743:
319:(IoT) devices. Mirai includes a table of IP address ranges that it will not infect, including
2723:
2028:
Fancy Bear Goes Phishing: The dark history of the information age, in five extraordinary hacks
920:
3582:
3535:
3443:
3370:
3154:
2518:
666:
336:
2765:
2621:
276:
Information on Mirai successors is somewhat cluttered and could be moved to its own section.
3862:
3179:
2544:
2265:
771:. The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC). Archived from
632:
557:
403:
239:
56:
8:
3669:
2697:
2513:
2106:
889:
197:
173:
3026:
3807:
3802:
3699:
3328:
3091:
3017:
2707:
2508:
893:
617:
582:
537:
510:
467:
368:
316:
3030:
2539:
3812:
3694:
3664:
3268:
3124:
2482:
2446:
2031:
993:
649:
487:
387:
266:
227:
184:
malware research group, and has been used in some of the largest and most disruptive
168:
in large-scale network attacks. It primarily targets online consumer devices such as
3842:
3740:
3592:
3515:
3164:
3101:
2976:
2425:
2315:
2257:
2249:
2023:
712:
586:
356:
220:
106:
82:
3438:
3750:
3725:
3617:
3530:
3525:
3169:
2961:
2871:
2575:
1589:
434:
422:
360:
320:
16:
Malware that turns computer systems running Linux into remotely controlled "bots"
149:
122:
45:
3489:
3484:
3174:
3159:
3149:
3144:
3076:
3051:
3046:
3041:
2986:
2760:
2441:
2215:"Satori botnet author in jail again after breaking pretrial release conditions"
1932:
799:
441:
177:
2631:
1603:"The Mirai botnet explained: How IoT devices almost brought down the internet"
440:
On 18 January 2018, a successor of Mirai is reported to be designed to hijack
3831:
3612:
3071:
3022:
2325:
2320:
1577:
997:
707:
695:
679:
661:
506:
573:
Its DDoS attacks were also notable in Brazil, Taiwan, Costa Rica and India.
3556:
3510:
3310:
3274:
3129:
3119:
3012:
3007:
3002:
2876:
2692:
2310:
1308:
1247:
536:
Mirai was later revealed to have been used during the DDoS attacks against
491:
206:
188:, including an attack on 20 September 2016 on computer security journalist
161:
3792:
3782:
3730:
3638:
3494:
3304:
3134:
2996:
2861:
830:
606:
372:
235:
231:
189:
1105:
444:
3735:
3720:
3648:
3388:
3292:
3244:
3220:
3208:
3066:
2991:
2981:
2971:
2956:
2916:
2841:
2472:
2346:
2305:
2030:(1st ed.). New York: Farrar, Straus and Giroux. pp. 280–281.
741:
717:
546:
312:
25:
1553:"Double-dip Internet-of-Things botnet attack felt across the Internet"
1244:"100,000-strong botnet built on router 0-day could strike at any time"
3766:
3643:
3607:
3597:
3469:
3286:
3036:
2966:
2906:
2467:
1393:"New Mirai Variant Focuses on Turning IoT Devices into Proxy Servers"
1111:
1023:
612:
553:
215:
169:
3674:
3602:
3587:
3406:
3382:
3256:
3238:
3139:
3061:
2896:
2881:
2335:
2300:
890:"Why a Hacker Dumped Code Behind Colossal Website-Trampling Botnet"
701:
689:
636:
594:
483:
738:"Hackers release source code for a powerful DDoS app called Mirai"
3704:
3577:
3540:
3474:
3453:
3423:
3376:
3358:
3280:
3214:
2911:
2901:
2886:
1746:"Unprecedented cyber attack takes Liberia's entire internet down"
1149:
1106:
Zeifman, Igal; Bekerman, Dima; Herzberg, Ben (October 10, 2016).
986:"The Mirai Botnet Was Part of a College Student Minecraft Scheme"
796:"MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled"
567:
526:
518:
311:
Devices infected by Mirai continuously scan the internet for the
153:
1658:"Blame the Internet of Things for Destroying the Internet Today"
1336:"Next-gen Mirai botnet targets cryptocurrency mining operations"
921:"What We Know About Friday's Massive East Coast Internet Outage"
3787:
3679:
3633:
3448:
3262:
3232:
3111:
3096:
2926:
2477:
1497:"Worm (Mirai?) Exploiting Android Debug Bridge (Port 5555/tcp)"
1177:"Mirai DDoS botnet powers up, infects Sierra Wireless gateways"
1082:"IoTroop Botnet: The Full Investigation - Check Point Research"
530:
522:
514:
456:
411:
384:
376:
348:
340:
165:
99:
1776:"DDoS attack from Mirai malware 'killing business' in Liberia"
1473:
624:
was reported to have questioned Jha on his involvement in the
3412:
3352:
3322:
1180:
426:
201:
157:
87:
509:
occurred using Mirai malware installed on a large number of
3684:
3479:
1417:
1019:"How an army of vulnerable gadgets took down the web today"
415:
1963:"FBI questions Rutgers student about massive cyber attack"
1802:"Massive cyber-attack grinds Liberia's internet to a halt"
1471:
1305:"New Mirai botnet species 'Okiru' hunts for ARC-based kit"
2663:
Hollywood Presbyterian Medical Center ransomware incident
2188:"Vancouver man charged in federal hacking case in Alaska"
863:"Leaked Mirai Malware Boosts IoT Insecurity Threat Level"
502:
495:
193:
2053:"Who is the GovRAT Author and Mirai Botmaster'Bestbuy'?"
1052:"Hackers create more IoT botnets with Mirai source code"
494:
also reported a 1 Tbit/s attack on French web host
213:
The software was initially used by the creators to DDoS
1688:"Former Rutgers student pleads guilty in cyber attacks"
474:
January 2019, and variant "SpeakUp" in February, 2019.
2080:"Mirai Malware Attacker Extradited From Germany to UK"
1632:"Today the web was broken by countless hacked devices"
856:
854:
852:
1447:"Wicked Botnet Uses Passel of Exploits to Target IoT"
1366:"Satori creator linked with new Mirai variant Masuta"
176:. The Mirai botnet was first found in August 2016 by
2287:
2104:
1904:"New Mirai Variant Embeds in TalkTalk Home Routers"
1494:
849:
652:, followed by the arrest and trial of the suspect.
581:At the end of November 2016, approximately 900,000
501:On 21 October 2016, multiple major DDoS attacks in
2077:
1547:
1545:
1108:"Breaking Down Mirai: An IoT DDoS Botnet Analysis"
949:
947:
945:
605:On January 17, 2017, computer security journalist
219:servers and companies offering DDoS protection to
1933:"Router hacker suspect arrested at Luton Airport"
1474:"Mirai mirai on the wall.. how many are you now?"
1274:"IoT Botnet: More Targets in Okiru's Cross-hairs"
860:
486:, in the DDoS attack on 20 September 2016 on the
3829:
1174:
383:. They speculate that the goal is to expand its
2703:Russian interference in the 2016 U.S. elections
2212:
2131:
1833:"Mirai Malware Is Still Launching DDoS Attacks"
1542:
1390:
1359:
1357:
1333:
942:
887:
2185:
1961:Clark, Adam; Mueller, Mark (21 January 2017).
1143:
398:On 12 December 2017, researchers identified a
2362:
2273:
2158:
1521:
1960:
1852:"New Mirai Worm Knocks 900K Germans Offline"
1849:
1418:Rommel Joven and Kenny Yang (May 17, 2018).
1363:
1354:
1302:
1146:"Source Code for Mirai IoT Malware Released"
1049:
956:"Who is Anna-Senpai, the Mirai Worm Author?"
824:
226:, with the authors using Mirai to operate a
186:distributed denial of service (DDoS) attacks
2673:Democratic National Committee cyber attacks
2161:"Newbie Hacker Fingered for Monster Botnet"
2107:"Huawei Home Routers in Botnet Recruitment"
2050:
1992:Justice, Department of (13 December 2017).
1472:Malwaremustdie/Unixfreaxjp (July 7, 2018).
793:
735:
670:references Mirai in its ongoing narrative.
2617:Office of Personnel Management data breach
2369:
2355:
2280:
2266:
2105:Check Point Research (December 21, 2017).
1600:
1444:
1241:
1139:
1137:
1135:
1133:
865:. securityintelligence.com. Archived from
660:American electronic musician and composer
576:
134:
55:
2242:
600:
566:Mirai has also been used in an attack on
299:Learn how and when to remove this message
30:Paras Jha, Josiah White and Dalton Norman
2376:
1743:
339:. A device remains infected until it is
234:for Mirai was subsequently published on
192:' website, an attack on French web host
2022:
1991:
1739:
1737:
1130:
3830:
2221:from the original on September 5, 2019
2194:from the original on September 5, 2018
2140:from the original on December 27, 2017
2078:Mathew J. Schwartz (August 31, 2017).
1717:"Think Mirai DDoS is over? It ain't!!"
1634:. theregister.co.uk. 21 October 2016.
1399:from the original on February 27, 2018
1205:
1031:from the original on November 16, 2016
827:"KrebsOnSecurity Hit With Record DDoS"
766:
477:
148:(from the Japanese word for "future",
2350:
2261:
2243:Greenberg, Andy (November 14, 2023).
2134:"Amateur Hacker Behind Satori Botnet"
2132:Catalin Cimpanu (December 22, 2017).
2113:from the original on February 6, 2018
2004:from the original on 13 December 2017
1854:. krebsonsecurity.com. Archived from
1812:from the original on 21 November 2016
1782:from the original on 22 November 2016
1756:from the original on 21 November 2016
1495:Johannes B. Ullrich (July 10, 2018).
1391:Catalin Cimpanu (February 27, 2018).
1372:from the original on February 7, 2018
1342:from the original on February 7, 2018
1315:from the original on January 16, 2018
1254:from the original on February 7, 2018
1175:Osborne, Charlie (October 17, 2016).
1016:
861:Bonderud, Douglas (October 4, 2016).
655:
156:that turns networked devices running
2213:Catalin Cimpanu (October 28, 2018).
2186:Jessica Prokop (September 4, 2018).
2086:from the original on August 31, 2017
1973:from the original on 23 January 2017
1830:
1734:
1668:from the original on 24 October 2016
1638:from the original on 24 October 2016
1334:Warwick Ashford (January 18, 2018).
1187:from the original on 20 October 2016
1156:from the original on 21 October 2016
1118:from the original on 21 October 2016
1062:from the original on 20 October 2016
912:
900:from the original on 22 October 2016
748:from the original on 20 October 2016
490:site which reached 620 Gbit/s.
249:
2668:Commission on Elections data breach
2167:from the original on August 7, 2019
1884:from the original on 5 January 2017
1144:Moffitt, Tyler (October 10, 2016).
888:Hackett, Robert (October 3, 2016).
825:Krebs, Brian (September 21, 2016).
13:
2236:
1744:McGoogan, Cara (4 November 2016).
1522:Satnam Narang (February 7, 2019).
1503:from the original on July 10, 2018
1296:
1210:. ServerComparator. Archived from
918:
414:infection, implementing two known
14:
3884:
2828:Jeff Bezos phone hacking incident
2159:Kevin Poulsen (August 30, 2018).
2059:from the original on July 5, 2017
1850:Krebs, Brian (30 November 2016).
1453:from the original on May 21, 2018
1426:from the original on May 23, 2018
1364:Rene Millman (January 26, 2018).
1303:Leyden, John (January 16, 2016).
1284:from the original on 23 July 2018
1050:Kan, Michael (October 18, 2016).
953:
505:services of DNS service provider
3401:Microarchitectural Data Sampling
2637:Ukrainian Power Grid Cyberattack
2545:Cyberterrorism attack of June 25
2288:Internet of things (IoT) malware
1530:from the original on May 6, 2019
1242:Dan Goodin (December 12, 2017).
1208:"DDoS on Dyn The Complete Story"
1017:Statt, Nick (October 21, 2016).
254:
2749:2017 Ukraine ransomware attacks
2586:2014 JPMorgan Chase data breach
2206:
2179:
2152:
2125:
2098:
2071:
2044:
2016:
1985:
1954:
1943:from the original on 2017-02-24
1925:
1896:
1870:
1843:
1824:
1794:
1768:
1723:from the original on 2016-10-27
1709:
1698:from the original on 2017-12-14
1680:
1650:
1624:
1613:from the original on 2019-07-24
1601:Fruhlinger, Josh (2018-03-09).
1594:
1570:
1559:from the original on 2017-05-19
1515:
1488:
1465:
1438:
1411:
1384:
1327:
1266:
1235:
1226:
1199:
1168:
1099:
1088:from the original on 2018-01-15
1074:
1043:
1010:
931:from the original on 2016-10-22
794:unixfreaxjp (August 31, 2016).
323:and addresses allocated to the
112:GNU General Public License v3.0
3858:Free software programmed in Go
3848:Software using the GPL license
2581:2014 celebrity nude photo leak
978:
881:
818:
787:
760:
729:
542:Central Authentication Service
164:that can be used as part of a
1:
3853:Free software programmed in C
2818:Bulgarian revenue agency hack
2596:Russian hacker password theft
723:
698:– another notable IoT malware
692:– another notable IoT malware
2952:Bangladesh Black Hat Hackers
2428:(publication of 2009 events)
2051:Brian Krebs (July 5, 2017).
767:njccic (December 28, 2016).
736:Biggs, John (Oct 10, 2016).
626:October 2016 Dyn cyberattack
429:devices for the first time.
325:United States Postal Service
7:
2813:Baltimore ransomware attack
1499:. SANS ISC InfoSec Forums.
1445:Tara Seals (May 21, 2018).
1206:Xander (October 28, 2016).
673:
393:
274:. The specific problem is:
10:
3889:
3087:Tailored Access Operations
2734:WannaCry ransomware attack
2627:Ashley Madison data breach
2571:Anthem medical data breach
2488:PlayStation network outage
482:Mirai was used, alongside
357:command and control server
245:
3838:Denial-of-service attacks
3775:
3759:
3713:
3657:
3626:
3570:
3549:
3503:
3462:
3431:
3422:
3193:
3110:
2940:
2840:
2823:WhatsApp snooping scandal
2800:
2774:
2716:
2688:Indian Bank data breaches
2650:
2609:
2563:
2527:
2501:
2455:
2418:
2411:
2382:
2293:
1664:. VICE. 21 October 2016.
1420:"A Wicked Family of Bots"
379:to evolve Mirai into new
160:into remotely controlled
117:
105:
93:
81:
66:
35:
24:
3365:Speculative Store Bypass
2932:Ukrainian Cyber Alliance
2729:2017 Macron e-mail leaks
685:Denial-of-service attack
2739:Westminster data breach
2658:Bangladesh Bank robbery
2601:2014 Yahoo! data breach
2591:2014 Sony Pictures hack
2550:2013 Yahoo! data breach
2535:South Korea cyberattack
2437:Operation Olympic Games
2432:Australian cyberattacks
577:Other notable incidents
364:to avoid being traced.
196:, and the October 2016
3082:Syrian Electronic Army
2792:SingHealth data breach
2555:Singapore cyberattacks
2493:RSA SecurID compromise
2082:. Bank Info Security.
1583:The internet of stings
704:– another IoT DDoS bot
601:Identity of the author
402:of Mirai exploiting a
3371:Lazy FP state restore
3155:Kristoffer von Hassel
2808:Sri Lanka cyberattack
2678:Vietnam Airport Hacks
2519:Operation High Roller
2136:. Bleeping Computer.
2055:. Krebs on Security.
1395:. Bleeping Computer.
1309:www.theregister.co.uk
667:Four Pieces for Mirai
329:Department of Defense
3317:Silent Bob is Silent
2377:Hacking in the 2010s
1837:bankinfosecurity.com
1831:Schwartz, Mathew J.
633:Lloyds Banking Group
433:processor (shorted:
410:to accelerate Mirai
408:Huawei HG532 routers
281:improve this section
270:to meet Knowledge's
3873:Cybercrime in India
3251:SS7 vulnerabilities
2787:Atlanta cyberattack
2756:Equifax data breach
2514:Stratfor email leak
2463:Canadian government
2442:Operation ShadowNet
2294:Notable IoT malware
2163:. The Daily Baast.
1858:on 20 December 2016
1808:. 3 November 2016.
1555:. 21 October 2016.
1338:. Computer Weekly.
1280:. 25 January 2018.
1214:on 21 November 2016
1084:. 29 October 2017.
837:on 15 November 2016
806:on 5 September 2016
775:on 12 December 2016
646:U.S. District Court
478:Use in DDoS attacks
198:DDoS attacks on Dyn
21:
3700:Petya and NotPetya
3329:ROCA vulnerability
3092:The Shadow Brokers
3018:Iranian Cyber Army
2944:persistent threats
2744:Petya and NotPetya
2708:2016 Bitfinex hack
2683:DCCC cyber attacks
2642:SWIFT banking hack
1880:. Deutsche Welle.
1588:2017-08-06 at the
1581:, 8 October 2016,
966:on 22 January 2017
919:Newman, Lily Hay.
869:on 21 October 2016
656:In popular culture
618:Rutgers University
538:Rutgers University
468:Internet of things
431:Argonaut RISC Core
369:Internet of things
317:Internet of things
129:/Mirai-Source-Code
52:/Mirai-Source-Code
26:Original author(s)
19:
3825:
3824:
3821:
3820:
3813:ZeroAccess botnet
3125:Mustafa Al-Bassam
2892:New World Hackers
2855:associated events
2836:
2835:
2632:VTech data breach
2483:Operation AntiSec
2447:Operation Payback
2406:
2405:
2344:
2343:
2190:. The Columbian.
2037:978-0-374-60117-1
1908:www.incapsula.com
960:Krebs on Security
488:Krebs on Security
361:anti-DoS software
309:
308:
301:
272:quality standards
263:This section may
228:protection racket
143:
142:
3880:
3429:
3428:
3102:Yemen Cyber Army
2426:Operation Aurora
2416:
2415:
2385:
2384:
2371:
2364:
2357:
2348:
2347:
2282:
2275:
2268:
2259:
2258:
2254:
2231:
2230:
2228:
2226:
2210:
2204:
2203:
2201:
2199:
2183:
2177:
2176:
2174:
2172:
2156:
2150:
2149:
2147:
2145:
2129:
2123:
2122:
2120:
2118:
2102:
2096:
2095:
2093:
2091:
2075:
2069:
2068:
2066:
2064:
2048:
2042:
2041:
2020:
2014:
2013:
2011:
2009:
1989:
1983:
1982:
1980:
1978:
1958:
1952:
1951:
1949:
1948:
1929:
1923:
1922:
1920:
1919:
1910:. Archived from
1900:
1894:
1893:
1891:
1889:
1874:
1868:
1867:
1865:
1863:
1847:
1841:
1840:
1828:
1822:
1821:
1819:
1817:
1798:
1792:
1791:
1789:
1787:
1772:
1766:
1765:
1763:
1761:
1741:
1732:
1731:
1729:
1728:
1713:
1707:
1706:
1704:
1703:
1684:
1678:
1677:
1675:
1673:
1654:
1648:
1647:
1645:
1643:
1628:
1622:
1621:
1619:
1618:
1598:
1592:
1574:
1568:
1567:
1565:
1564:
1549:
1540:
1539:
1537:
1535:
1519:
1513:
1512:
1510:
1508:
1492:
1486:
1485:
1483:
1481:
1469:
1463:
1462:
1460:
1458:
1442:
1436:
1435:
1433:
1431:
1415:
1409:
1408:
1406:
1404:
1388:
1382:
1381:
1379:
1377:
1361:
1352:
1351:
1349:
1347:
1331:
1325:
1324:
1322:
1320:
1300:
1294:
1293:
1291:
1289:
1270:
1264:
1263:
1261:
1259:
1239:
1233:
1230:
1224:
1223:
1221:
1219:
1203:
1197:
1196:
1194:
1192:
1172:
1166:
1165:
1163:
1161:
1141:
1128:
1127:
1125:
1123:
1103:
1097:
1096:
1094:
1093:
1078:
1072:
1071:
1069:
1067:
1047:
1041:
1040:
1038:
1036:
1014:
1008:
1007:
1005:
1004:
982:
976:
975:
973:
971:
962:. Archived from
951:
940:
939:
937:
936:
916:
910:
909:
907:
905:
885:
879:
878:
876:
874:
858:
847:
846:
844:
842:
833:. Archived from
822:
816:
815:
813:
811:
802:. Archived from
791:
785:
784:
782:
780:
764:
758:
757:
755:
753:
733:
587:Deutsche Telekom
321:private networks
304:
297:
293:
290:
284:
258:
257:
250:
139:
138:
131:
128:
126:
124:
83:Operating system
59:
54:
51:
49:
47:
22:
18:
3888:
3887:
3883:
3882:
3881:
3879:
3878:
3877:
3828:
3827:
3826:
3817:
3771:
3755:
3709:
3653:
3622:
3566:
3545:
3499:
3458:
3418:
3198:
3196:vulnerabilities
3189:
3106:
2999:(confederation)
2962:Charming Kitten
2943:
2936:
2872:Goatse Security
2832:
2796:
2770:
2761:Deloitte breach
2712:
2698:Dyn cyberattack
2646:
2605:
2576:Operation Tovar
2559:
2523:
2497:
2451:
2412:Major incidents
2407:
2378:
2375:
2345:
2340:
2289:
2286:
2239:
2237:Further reading
2234:
2224:
2222:
2211:
2207:
2197:
2195:
2184:
2180:
2170:
2168:
2157:
2153:
2143:
2141:
2130:
2126:
2116:
2114:
2109:. Check Point.
2103:
2099:
2089:
2087:
2076:
2072:
2062:
2060:
2049:
2045:
2038:
2021:
2017:
2007:
2005:
1990:
1986:
1976:
1974:
1959:
1955:
1946:
1944:
1931:
1930:
1926:
1917:
1915:
1902:
1901:
1897:
1887:
1885:
1876:
1875:
1871:
1861:
1859:
1848:
1844:
1829:
1825:
1815:
1813:
1800:
1799:
1795:
1785:
1783:
1774:
1773:
1769:
1759:
1757:
1742:
1735:
1726:
1724:
1715:
1714:
1710:
1701:
1699:
1686:
1685:
1681:
1671:
1669:
1656:
1655:
1651:
1641:
1639:
1630:
1629:
1625:
1616:
1614:
1599:
1595:
1590:Wayback Machine
1575:
1571:
1562:
1560:
1551:
1550:
1543:
1533:
1531:
1520:
1516:
1506:
1504:
1493:
1489:
1479:
1477:
1470:
1466:
1456:
1454:
1449:. Threat Post.
1443:
1439:
1429:
1427:
1416:
1412:
1402:
1400:
1389:
1385:
1375:
1373:
1368:. SC Media UK.
1362:
1355:
1345:
1343:
1332:
1328:
1318:
1316:
1301:
1297:
1287:
1285:
1272:
1271:
1267:
1257:
1255:
1240:
1236:
1231:
1227:
1217:
1215:
1204:
1200:
1190:
1188:
1173:
1169:
1159:
1157:
1142:
1131:
1121:
1119:
1104:
1100:
1091:
1089:
1080:
1079:
1075:
1065:
1063:
1048:
1044:
1034:
1032:
1015:
1011:
1002:
1000:
984:
983:
979:
969:
967:
952:
943:
934:
932:
917:
913:
903:
901:
886:
882:
872:
870:
859:
850:
840:
838:
823:
819:
809:
807:
792:
788:
778:
776:
765:
761:
751:
749:
734:
730:
726:
676:
658:
603:
579:
480:
396:
305:
294:
288:
285:
278:
259:
255:
248:
133:
121:
62:
44:
31:
17:
12:
11:
5:
3886:
3876:
3875:
3870:
3865:
3860:
3855:
3850:
3845:
3840:
3823:
3822:
3819:
3818:
3816:
3815:
3810:
3805:
3800:
3795:
3790:
3785:
3779:
3777:
3773:
3772:
3770:
3769:
3763:
3761:
3757:
3756:
3754:
3753:
3748:
3743:
3738:
3733:
3728:
3723:
3717:
3715:
3711:
3710:
3708:
3707:
3702:
3697:
3692:
3687:
3682:
3677:
3672:
3667:
3661:
3659:
3655:
3654:
3652:
3651:
3646:
3641:
3636:
3630:
3628:
3624:
3623:
3621:
3620:
3615:
3610:
3605:
3600:
3595:
3590:
3585:
3583:Black Energy 3
3580:
3574:
3572:
3568:
3567:
3565:
3564:
3559:
3553:
3551:
3547:
3546:
3544:
3543:
3538:
3533:
3528:
3523:
3518:
3513:
3507:
3505:
3501:
3500:
3498:
3497:
3492:
3490:Metulji botnet
3487:
3482:
3477:
3472:
3466:
3464:
3460:
3459:
3457:
3456:
3451:
3446:
3444:Black Energy 2
3441:
3435:
3433:
3426:
3420:
3419:
3417:
3416:
3410:
3404:
3398:
3392:
3386:
3380:
3374:
3368:
3362:
3356:
3350:
3344:
3338:
3332:
3326:
3320:
3314:
3308:
3302:
3299:Broadcom Wi-Fi
3296:
3290:
3284:
3278:
3272:
3266:
3260:
3254:
3248:
3242:
3236:
3230:
3224:
3218:
3212:
3205:
3203:
3191:
3190:
3188:
3187:
3182:
3177:
3172:
3167:
3162:
3160:Junaid Hussain
3157:
3152:
3150:Jeremy Hammond
3147:
3145:Elliott Gunton
3142:
3137:
3132:
3127:
3122:
3116:
3114:
3108:
3107:
3105:
3104:
3099:
3094:
3089:
3084:
3079:
3077:Stealth Falcon
3074:
3069:
3064:
3059:
3054:
3052:PLA Unit 61486
3049:
3047:PLA Unit 61398
3044:
3042:Numbered Panda
3039:
3034:
3020:
3015:
3010:
3005:
3000:
2994:
2989:
2987:Equation Group
2984:
2979:
2974:
2969:
2964:
2959:
2954:
2948:
2946:
2938:
2937:
2935:
2934:
2929:
2924:
2919:
2914:
2909:
2904:
2899:
2894:
2889:
2884:
2879:
2874:
2869:
2864:
2859:
2858:
2857:
2846:
2844:
2838:
2837:
2834:
2833:
2831:
2830:
2825:
2820:
2815:
2810:
2804:
2802:
2798:
2797:
2795:
2794:
2789:
2784:
2778:
2776:
2772:
2771:
2769:
2768:
2763:
2758:
2753:
2752:
2751:
2741:
2736:
2731:
2726:
2720:
2718:
2714:
2713:
2711:
2710:
2705:
2700:
2695:
2690:
2685:
2680:
2675:
2670:
2665:
2660:
2654:
2652:
2648:
2647:
2645:
2644:
2639:
2634:
2629:
2624:
2619:
2613:
2611:
2607:
2606:
2604:
2603:
2598:
2593:
2588:
2583:
2578:
2573:
2567:
2565:
2561:
2560:
2558:
2557:
2552:
2547:
2542:
2537:
2531:
2529:
2525:
2524:
2522:
2521:
2516:
2511:
2505:
2503:
2499:
2498:
2496:
2495:
2490:
2485:
2480:
2478:HBGary Federal
2475:
2470:
2465:
2459:
2457:
2453:
2452:
2450:
2449:
2444:
2439:
2434:
2429:
2422:
2420:
2413:
2409:
2408:
2404:
2403:
2397:
2392:
2383:
2380:
2379:
2374:
2373:
2366:
2359:
2351:
2342:
2341:
2339:
2338:
2333:
2328:
2323:
2318:
2313:
2308:
2303:
2297:
2295:
2291:
2290:
2285:
2284:
2277:
2270:
2262:
2256:
2255:
2238:
2235:
2233:
2232:
2205:
2178:
2151:
2124:
2097:
2070:
2043:
2036:
2024:Shapiro, Scott
2015:
1984:
1953:
1939:. 2017-02-23.
1924:
1895:
1869:
1842:
1823:
1793:
1767:
1733:
1708:
1679:
1649:
1623:
1593:
1569:
1541:
1514:
1487:
1464:
1437:
1410:
1383:
1353:
1326:
1295:
1265:
1234:
1225:
1198:
1167:
1129:
1098:
1073:
1042:
1009:
977:
954:Krebs, Brian.
941:
911:
880:
848:
817:
800:MalwareMustDie
786:
769:"Mirai Botnet"
759:
727:
725:
722:
721:
720:
715:
710:
705:
699:
693:
687:
682:
675:
672:
664:'s 2018 album
657:
654:
602:
599:
578:
575:
479:
476:
442:cryptocurrency
435:ARC processors
423:ARC processors
395:
392:
307:
306:
262:
260:
253:
247:
244:
178:MalwareMustDie
141:
140:
119:
115:
114:
109:
103:
102:
97:
91:
90:
85:
79:
78:
68:
64:
63:
61:
60:
41:
39:
33:
32:
28:
15:
9:
6:
4:
3:
2:
3885:
3874:
3871:
3869:
3868:Linux malware
3866:
3864:
3861:
3859:
3856:
3854:
3851:
3849:
3846:
3844:
3841:
3839:
3836:
3835:
3833:
3814:
3811:
3809:
3806:
3804:
3801:
3799:
3796:
3794:
3791:
3789:
3786:
3784:
3781:
3780:
3778:
3774:
3768:
3765:
3764:
3762:
3758:
3752:
3749:
3747:
3744:
3742:
3739:
3737:
3734:
3732:
3729:
3727:
3724:
3722:
3719:
3718:
3716:
3712:
3706:
3703:
3701:
3698:
3696:
3693:
3691:
3688:
3686:
3683:
3681:
3678:
3676:
3673:
3671:
3668:
3666:
3663:
3662:
3660:
3656:
3650:
3647:
3645:
3642:
3640:
3637:
3635:
3632:
3631:
3629:
3625:
3619:
3616:
3614:
3613:Gameover ZeuS
3611:
3609:
3606:
3604:
3601:
3599:
3596:
3594:
3591:
3589:
3586:
3584:
3581:
3579:
3576:
3575:
3573:
3569:
3563:
3560:
3558:
3555:
3554:
3552:
3548:
3542:
3539:
3537:
3534:
3532:
3529:
3527:
3524:
3522:
3519:
3517:
3514:
3512:
3509:
3508:
3506:
3502:
3496:
3493:
3491:
3488:
3486:
3483:
3481:
3478:
3476:
3473:
3471:
3468:
3467:
3465:
3461:
3455:
3452:
3450:
3447:
3445:
3442:
3440:
3437:
3436:
3434:
3430:
3427:
3425:
3421:
3414:
3411:
3408:
3405:
3402:
3399:
3396:
3393:
3390:
3387:
3384:
3381:
3378:
3375:
3372:
3369:
3366:
3363:
3360:
3357:
3354:
3351:
3348:
3345:
3342:
3339:
3336:
3333:
3330:
3327:
3324:
3321:
3318:
3315:
3312:
3309:
3306:
3303:
3300:
3297:
3294:
3291:
3288:
3285:
3282:
3279:
3276:
3273:
3270:
3267:
3264:
3261:
3258:
3255:
3252:
3249:
3246:
3243:
3240:
3237:
3234:
3231:
3228:
3225:
3222:
3219:
3216:
3213:
3210:
3207:
3206:
3204:
3202:
3197:
3192:
3186:
3183:
3181:
3178:
3176:
3173:
3171:
3168:
3166:
3163:
3161:
3158:
3156:
3153:
3151:
3148:
3146:
3143:
3141:
3138:
3136:
3133:
3131:
3128:
3126:
3123:
3121:
3118:
3117:
3115:
3113:
3109:
3103:
3100:
3098:
3095:
3093:
3090:
3088:
3085:
3083:
3080:
3078:
3075:
3073:
3072:Rocket Kitten
3070:
3068:
3065:
3063:
3060:
3058:
3055:
3053:
3050:
3048:
3045:
3043:
3040:
3038:
3035:
3032:
3028:
3024:
3023:Lazarus Group
3021:
3019:
3016:
3014:
3011:
3009:
3006:
3004:
3001:
2998:
2995:
2993:
2990:
2988:
2985:
2983:
2980:
2978:
2975:
2973:
2970:
2968:
2965:
2963:
2960:
2958:
2955:
2953:
2950:
2949:
2947:
2945:
2939:
2933:
2930:
2928:
2925:
2923:
2920:
2918:
2915:
2913:
2910:
2908:
2905:
2903:
2900:
2898:
2895:
2893:
2890:
2888:
2885:
2883:
2880:
2878:
2875:
2873:
2870:
2868:
2865:
2863:
2860:
2856:
2853:
2852:
2851:
2848:
2847:
2845:
2843:
2839:
2829:
2826:
2824:
2821:
2819:
2816:
2814:
2811:
2809:
2806:
2805:
2803:
2799:
2793:
2790:
2788:
2785:
2783:
2780:
2779:
2777:
2773:
2767:
2766:Disqus breach
2764:
2762:
2759:
2757:
2754:
2750:
2747:
2746:
2745:
2742:
2740:
2737:
2735:
2732:
2730:
2727:
2725:
2722:
2721:
2719:
2715:
2709:
2706:
2704:
2701:
2699:
2696:
2694:
2691:
2689:
2686:
2684:
2681:
2679:
2676:
2674:
2671:
2669:
2666:
2664:
2661:
2659:
2656:
2655:
2653:
2649:
2643:
2640:
2638:
2635:
2633:
2630:
2628:
2625:
2623:
2620:
2618:
2615:
2614:
2612:
2608:
2602:
2599:
2597:
2594:
2592:
2589:
2587:
2584:
2582:
2579:
2577:
2574:
2572:
2569:
2568:
2566:
2562:
2556:
2553:
2551:
2548:
2546:
2543:
2541:
2540:Snapchat hack
2538:
2536:
2533:
2532:
2530:
2526:
2520:
2517:
2515:
2512:
2510:
2509:LinkedIn hack
2507:
2506:
2504:
2500:
2494:
2491:
2489:
2486:
2484:
2481:
2479:
2476:
2474:
2471:
2469:
2466:
2464:
2461:
2460:
2458:
2454:
2448:
2445:
2443:
2440:
2438:
2435:
2433:
2430:
2427:
2424:
2423:
2421:
2417:
2414:
2410:
2402: →
2401:
2398:
2396:
2393:
2391:
2388:←
2387:
2386:
2381:
2372:
2367:
2365:
2360:
2358:
2353:
2352:
2349:
2337:
2334:
2332:
2329:
2327:
2326:Linux.Wifatch
2324:
2322:
2321:Linux.Darlloz
2319:
2317:
2314:
2312:
2309:
2307:
2304:
2302:
2299:
2298:
2296:
2292:
2283:
2278:
2276:
2271:
2269:
2264:
2263:
2260:
2252:
2251:
2246:
2241:
2240:
2220:
2216:
2209:
2193:
2189:
2182:
2166:
2162:
2155:
2139:
2135:
2128:
2112:
2108:
2101:
2085:
2081:
2074:
2058:
2054:
2047:
2039:
2033:
2029:
2025:
2019:
2003:
1999:
1995:
1988:
1972:
1968:
1964:
1957:
1942:
1938:
1934:
1928:
1914:on 2016-12-22
1913:
1909:
1905:
1899:
1883:
1879:
1873:
1857:
1853:
1846:
1838:
1834:
1827:
1811:
1807:
1803:
1797:
1781:
1777:
1771:
1755:
1751:
1750:The Telegraph
1747:
1740:
1738:
1722:
1718:
1712:
1697:
1693:
1689:
1683:
1667:
1663:
1659:
1653:
1637:
1633:
1627:
1612:
1608:
1604:
1597:
1591:
1587:
1584:
1580:
1579:
1578:The Economist
1573:
1558:
1554:
1548:
1546:
1529:
1525:
1518:
1502:
1498:
1491:
1475:
1468:
1452:
1448:
1441:
1425:
1421:
1414:
1398:
1394:
1387:
1371:
1367:
1360:
1358:
1341:
1337:
1330:
1314:
1310:
1306:
1299:
1283:
1279:
1275:
1269:
1253:
1249:
1245:
1238:
1229:
1213:
1209:
1202:
1186:
1182:
1178:
1171:
1155:
1151:
1147:
1140:
1138:
1136:
1134:
1117:
1113:
1109:
1102:
1087:
1083:
1077:
1061:
1057:
1053:
1046:
1030:
1026:
1025:
1020:
1013:
999:
995:
991:
987:
981:
965:
961:
957:
950:
948:
946:
930:
926:
922:
915:
899:
895:
891:
884:
868:
864:
857:
855:
853:
836:
832:
828:
821:
805:
801:
797:
790:
774:
770:
763:
747:
743:
739:
732:
728:
719:
716:
714:
711:
709:
708:Linux.Wifatch
706:
703:
700:
697:
696:Linux.Darlloz
694:
691:
688:
686:
683:
681:
680:Linux malware
678:
677:
671:
669:
668:
663:
662:James Ferraro
653:
651:
647:
641:
638:
634:
629:
627:
623:
619:
615:
614:
608:
598:
596:
591:
588:
584:
574:
571:
569:
564:
561:
559:
555:
552:
548:
543:
539:
534:
532:
528:
524:
520:
516:
512:
508:
504:
499:
497:
493:
489:
485:
475:
471:
469:
464:
460:
458:
452:
448:
446:
443:
438:
436:
432:
428:
424:
419:
417:
413:
409:
405:
401:
391:
389:
386:
382:
378:
374:
370:
365:
362:
358:
353:
350:
344:
342:
338:
332:
330:
326:
322:
318:
314:
303:
300:
292:
282:
277:
273:
269:
268:
261:
252:
251:
243:
241:
237:
233:
229:
225:
223:
218:
217:
211:
209:
208:
203:
199:
195:
191:
187:
183:
179:
175:
171:
167:
163:
159:
155:
151:
147:
137:
130:
120:
116:
113:
110:
108:
104:
101:
98:
96:
92:
89:
86:
84:
80:
76:
72:
69:
65:
58:
53:
43:
42:
40:
38:
34:
29:
27:
23:
3689:
3557:CryptoLocker
3311:DoublePulsar
3130:Cyber Anakin
3120:Ryan Ackroyd
3013:Helix Kitten
3008:Hacking Team
3003:Guccifer 2.0
2877:Lizard Squad
2693:Surkov leaks
2622:Hacking Team
2330:
2248:
2223:. Retrieved
2208:
2198:September 4,
2196:. Retrieved
2181:
2169:. Retrieved
2154:
2142:. Retrieved
2127:
2115:. Retrieved
2100:
2088:. Retrieved
2073:
2061:. Retrieved
2046:
2027:
2018:
2006:. Retrieved
1997:
1987:
1975:. Retrieved
1966:
1956:
1945:. Retrieved
1936:
1927:
1916:. Retrieved
1912:the original
1907:
1898:
1886:. Retrieved
1872:
1860:. Retrieved
1856:the original
1845:
1836:
1826:
1814:. Retrieved
1806:The Guardian
1805:
1796:
1784:. Retrieved
1770:
1758:. Retrieved
1749:
1725:. Retrieved
1711:
1700:. Retrieved
1692:North Jersey
1691:
1682:
1670:. Retrieved
1661:
1652:
1640:. Retrieved
1626:
1615:. Retrieved
1606:
1596:
1576:
1572:
1561:. Retrieved
1532:. Retrieved
1517:
1505:. Retrieved
1490:
1478:. Retrieved
1467:
1455:. Retrieved
1440:
1428:. Retrieved
1422:. Fortinet.
1413:
1403:February 27,
1401:. Retrieved
1386:
1374:. Retrieved
1344:. Retrieved
1329:
1317:. Retrieved
1298:
1286:. Retrieved
1277:
1268:
1256:. Retrieved
1248:Ars Technica
1237:
1228:
1216:. Retrieved
1212:the original
1201:
1189:. Retrieved
1170:
1158:. Retrieved
1120:. Retrieved
1101:
1090:. Retrieved
1076:
1064:. Retrieved
1045:
1033:. Retrieved
1022:
1012:
1001:. Retrieved
989:
980:
968:. Retrieved
964:the original
959:
933:. Retrieved
924:
914:
902:. Retrieved
883:
871:. Retrieved
867:the original
839:. Retrieved
835:the original
820:
808:. Retrieved
804:the original
789:
777:. Retrieved
773:the original
762:
750:. Retrieved
731:
665:
659:
642:
630:
611:
604:
592:
580:
572:
565:
562:
550:
535:
500:
492:Ars Technica
481:
472:
465:
461:
453:
449:
447:operations.
439:
430:
420:
407:
399:
397:
380:
367:Mirai as an
366:
354:
345:
333:
310:
295:
286:
279:Please help
275:
264:
221:
214:
212:
205:
174:home routers
145:
144:
77:(controller)
3863:IoT malware
3793:NetTraveler
3731:LogicLocker
3639:Hidden Tear
3536:Red October
3395:Dragonblood
3305:EternalBlue
3269:Stagefright
3135:George Hotz
3112:Individuals
2862:CyberBerkut
2225:October 28,
2144:February 4,
2117:February 4,
2008:13 December
1998:justice.gov
1862:14 December
1816:21 November
1786:21 November
1778:. PCWorld.
1760:21 November
1662:Motherboard
1534:February 7,
1526:. Tenable.
1376:February 4,
1346:February 4,
1319:February 4,
1258:February 4,
1218:21 November
1035:October 21,
894:Fortune.com
841:17 November
831:Brian Krebs
779:28 December
607:Brian Krebs
511:IoT devices
373:source code
289:August 2024
283:if you can.
240:open-source
236:Hack Forums
232:source code
207:Mirai Nikki
190:Brian Krebs
3832:Categories
3736:Rensenware
3721:BrickerBot
3649:TeslaCrypt
3439:Bad Rabbit
3389:Foreshadow
3293:Cloudbleed
3245:Row hammer
3227:Shellshock
3221:Heartbleed
3209:Evercookie
3185:The Jester
3067:Red Apollo
3027:BlueNorOff
2997:GOSSIPGIRL
2992:Fancy Bear
2982:Elfin Team
2977:DarkMatter
2972:Dark Basin
2957:Bureau 121
2917:Teamp0ison
2842:Hacktivism
2473:DNSChanger
2306:BrickerBot
2217:. ZD Net.
2171:August 30,
2090:August 31,
1977:25 January
1947:2017-02-23
1918:2016-12-18
1727:2016-10-26
1702:2017-12-14
1672:27 October
1642:24 October
1617:2019-07-24
1607:CSO Online
1563:2017-06-14
1191:20 October
1160:20 October
1122:20 October
1092:2018-01-14
1066:20 October
1003:2020-10-19
970:25 January
935:2016-10-21
904:19 October
873:20 October
752:19 October
742:TechCrunch
724:References
718:BrickerBot
558:bus system
551:/r/Rutgers
547:Reddit AMA
313:IP address
170:IP cameras
67:Written in
37:Repository
3767:VPNFilter
3644:Rombertik
3608:FinFisher
3598:DarkHotel
3562:DarkSeoul
3470:Coreflood
3335:BlueBorne
3287:Dirty COW
3201:disclosed
3199:publicly
3037:NSO Group
2967:Cozy Bear
2907:PayPal 14
2850:Anonymous
2724:SHAttered
2468:DigiNotar
1888:5 January
1112:Incapsula
1024:The Verge
998:1059-1028
810:31 August
650:Anchorage
613:Shimoneta
554:subreddit
459:website.
337:bandwidth
222:Minecraft
216:Minecraft
182:white hat
127:/jgamblin
73:(agent),
50:/jgamblin
3808:Titanium
3751:XafeCopy
3746:WannaCry
3675:KeRanger
3603:Duqu 2.0
3588:Carbanak
3407:BlueKeep
3383:SigSpoof
3341:Meltdown
3257:WinShock
3239:Rootpipe
3140:Guccifer
3062:Pranknet
3057:PLATINUM
3031:AndAriel
2942:Advanced
2897:NullCrew
2882:LulzRaft
2782:Trustico
2395:Timeline
2336:Remaiten
2301:BASHLITE
2219:Archived
2192:Archived
2165:Archived
2138:Archived
2111:Archived
2084:Archived
2057:Archived
2026:(2023).
2002:Archived
1971:Archived
1941:Archived
1937:BBC News
1882:Archived
1810:Archived
1780:Archived
1754:Archived
1721:Archived
1696:Archived
1666:Archived
1636:Archived
1611:Archived
1586:Archived
1557:Archived
1528:Archived
1507:July 11,
1501:Archived
1451:Archived
1424:Archived
1397:Archived
1370:Archived
1340:Archived
1313:Archived
1288:18 April
1282:Archived
1278:Fortinet
1252:Archived
1185:Archived
1154:Archived
1116:Archived
1086:Archived
1060:Archived
1029:Archived
929:Archived
898:Archived
746:Archived
702:Remaiten
690:BASHLITE
674:See also
637:Barclays
484:BASHLITE
406:flaw in
404:zero-day
394:Variants
381:variants
341:rebooted
265:require
3843:Botnets
3705:X-Agent
3695:Pegasus
3578:Brambul
3541:Shamoon
3485:Kelihos
3475:Alureon
3454:Stuxnet
3424:Malware
3377:TLBleed
3359:Exactis
3347:Spectre
3281:Badlock
3215:iSeeYou
3180:Topiary
2912:RedHack
2902:OurMine
2887:LulzSec
2063:July 5,
1480:July 7,
1476:. Imgur
1457:May 21,
1430:May 17,
1150:Webroot
1056:ITWORLD
585:, from
583:routers
568:Liberia
549:on the
527:Netflix
519:Twitter
457:Russian
412:botnets
400:variant
267:cleanup
246:Malware
224:servers
204:series
154:malware
118:Website
107:License
3788:Joanap
3741:Triton
3680:Necurs
3670:Jigsaw
3665:Hitler
3634:Dridex
3593:Careto
3516:Dexter
3449:SpyEye
3415:(2019)
3409:(2019)
3403:(2019)
3397:(2019)
3391:(2018)
3385:(2018)
3379:(2018)
3373:(2018)
3367:(2018)
3361:(2018)
3355:(2018)
3349:(2018)
3343:(2018)
3337:(2017)
3331:(2017)
3325:(2017)
3319:(2017)
3313:(2017)
3307:(2017)
3301:(2017)
3295:(2017)
3289:(2016)
3283:(2016)
3277:(2016)
3271:(2015)
3265:(2015)
3263:JASBUG
3259:(2014)
3253:(2014)
3247:(2014)
3241:(2014)
3235:(2014)
3233:POODLE
3229:(2014)
3223:(2014)
3217:(2013)
3211:(2010)
3194:Major
3175:Track2
3097:xDedic
2927:UGNazi
2316:Hajime
2034:
1967:NJ.com
996:
713:Hajime
531:Airbnb
523:Reddit
515:GitHub
445:mining
425:based
385:botnet
377:GitHub
349:telnet
230:. The
166:botnet
132:
123:github
100:Botnet
46:github
3803:Tinba
3690:Mirai
3618:Regin
3531:Mahdi
3526:Flame
3511:Carna
3495:Stars
3413:Kr00k
3353:EFAIL
3323:KRACK
3275:DROWN
2400:2020s
2390:2000s
2331:Mirai
2311:Carna
2250:Wired
1181:ZDNet
990:Wired
925:WIRED
427:Linux
202:anime
158:Linux
152:) is
146:Mirai
88:Linux
20:Mirai
3798:R2D2
3783:Grum
3776:2019
3760:2018
3726:Kirk
3714:2017
3685:MEMZ
3658:2016
3627:2015
3571:2014
3550:2013
3504:2012
3480:Duqu
3463:2011
3432:2010
3170:Sabu
2922:TDO
2867:GNAA
2801:2019
2775:2018
2717:2017
2651:2016
2610:2015
2564:2014
2528:2013
2502:2012
2456:2011
2419:2010
2227:2018
2200:2018
2173:2018
2146:2018
2119:2018
2092:2017
2065:2017
2032:ISBN
2010:2017
1979:2017
1890:2017
1864:2016
1818:2016
1788:2016
1762:2016
1674:2016
1644:2016
1536:2019
1509:2018
1482:2018
1459:2018
1432:2018
1405:2018
1378:2018
1348:2018
1321:2016
1290:2018
1260:2018
1220:2016
1193:2016
1162:2016
1124:2016
1068:2016
1037:2016
994:ISSN
972:2017
906:2016
875:2016
843:2016
812:2016
781:2016
754:2016
635:and
416:SOAP
388:node
327:and
180:, a
172:and
162:bots
125:.com
95:Type
48:.com
3521:FBI
3165:MLT
3029:) (
648:in
622:FBI
595:BBC
507:Dyn
503:DNS
496:OVH
375:on
315:of
238:as
194:OVH
3834::
2247:.
2000:.
1996:.
1969:.
1965:.
1935:.
1906:.
1835:.
1804:.
1752:.
1748:.
1736:^
1719:.
1694:.
1690:.
1660:.
1609:.
1605:.
1544:^
1356:^
1311:.
1307:.
1276:.
1250:.
1246:.
1183:.
1179:.
1152:.
1148:.
1132:^
1114:.
1110:.
1058:.
1054:.
1027:.
1021:.
992:.
988:.
958:.
944:^
927:.
923:.
896:.
892:.
851:^
829:.
798:.
744:.
740:.
597:.
529:,
525:,
521:,
517:,
498:.
331:.
210:.
150:未来
75:Go
3033:)
3025:(
2370:e
2363:t
2356:v
2281:e
2274:t
2267:v
2253:.
2229:.
2202:.
2175:.
2148:.
2121:.
2094:.
2067:.
2040:.
2012:.
1981:.
1950:.
1921:.
1892:.
1866:.
1839:.
1820:.
1790:.
1764:.
1730:.
1705:.
1676:.
1646:.
1620:.
1566:.
1538:.
1511:.
1484:.
1461:.
1434:.
1407:.
1380:.
1350:.
1323:.
1292:.
1262:.
1222:.
1195:.
1164:.
1126:.
1095:.
1070:.
1039:.
1006:.
974:.
938:.
908:.
877:.
845:.
814:.
783:.
756:.
302:)
296:(
291:)
287:(
71:C
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.