Read this story at Slashdot.
An anonymous reader quotes a report by Ars Technica: Mirai, the”botnet” malware that was responsible for a series of massive distributed denial of service (DDoS) attacks in 2016 — including one against the website of safety reporter Brian Krebs — has gotten a range of recent updates. Now, developers employing the widely distributed”open” source code of the first have added a raft of new apparatus to their potential bot armies by inputting the code for four more microprocessors widely utilized in embedded systems.
Researchers in Palo Alto Networks’ Unit 42 security research unit have printed details of fresh samples of this Mirai botnet found in late February. The new versions of the malware targeted Xilinx MicroBlaze processors, OpenRISC, Tensilica Xtensa, and Altera Nios II. These processors are used on a broad assortment of embedded systems networked sensors group radios for communications and digital signal processors. The new variants also incorporate a brand new form of the original Mirai TCP SYN attack and a modified encryption algorithm for botnet communications. Based on this new attack option’s signature, Unit 42 investigators managed to trace activity of the variants back as far.