SECURITY EXPERTS have warned that Mirai, the malware behind an Internet of Things (IoT) botnet, could be adapted to survive device reboots, enabling hackers to build bigger and more disruptive botnets.
Mirai is able to take over insecure IoT devices, enabling attackers to build botnets that they can use in attacks – either surreptitious attacks or aggressive distributed denial of service (DDoS) attacks.
The malware surfaced last year when it infected, en masse, home security systems and digital video recorders (DVRs), which were running old versions of the open source operating system Linux.
Mirai is, perhaps, best known for its part in the DDoS attack on internet infrastructure firm Dyn, which caused problems accessing sites including Amazon, Netflix and Twitter.
Malware in IoT devices generally survives until the user reboots the equipment, clearing the memory and erasing any trace of malware from the device.
However, researchers from Pen Test Partners have discovered a new vulnerability that could enable the Mirai IoT worm and other IoT malware to survive between device reboots – creating what would be a far more resilient or even permanent IoT botnet.
In a blog post, the company claimed to have found a route to remotely fix devices vulnerable to Mirai, but that this same method could be used to make Mirai persistent beyond a power-off reboot.
For Full Story, Please click here.