3 weeks ago

completely new Mirai Okiru Botnet targets devices running widely-used ARC Processors


The cybersecurity threat landscape has never been more extensive along with also is usually most likely to grow exponentially in 2018.

Although the original creators of Mirai DDoS botnet have already been arrested along with also jailed, the variants of the infamous IoT malware are still inside the game due to the availability of its source code on the Internet.

Security researchers have spotted a completely new variant of infamous Mirai IoT malware designed to hijack insecure devices that will run on ARC embedded processors.

Until currently, Mirai along with also its variants have been targeting CPU architectures—including x86, ARM, Sparc, MIPS, PowerPC along with also Motorola 6800—deployed in millions of Internet of Things (IoT) devices.

completely new Mirai Okiru Botnet

Dubbed Okiru, the completely new Mirai variant, first spotted by @unixfreaxjp through MalwareMustDie team along with also notified by independent researcher Odisseus, is usually a completely new piece of ELF malware that will targets ARC-based embedded devices running Linux operating system.

This kind of is usually initially ever inside the history of computer engineering that will there is usually a malware for ARC CPU, & that will is usually #MIRAI OKIRU!! Pls be noted of This kind of fact, & be ready for the bigger impact on infection Mirai (specially #Okiru) to devices hasn’t been infected yet,” Odisseus tweeted.

ARC (Argonaut RISC Core) embedded processor is usually the earth’s second-most-common CPU core that will’s being shipped in more than 2 billion products every year, including cameras, mobile, utility meters, televisions, flash drives, automotive along with also the Internet of Things.


However, This kind of isn’t first Mirai botnet variant based on Linux ELF malware. Mirai also has another ELF-based variant, which was designed to target devices running MIPS along with also ARM processors.

that will should also be noted that will Okiru, which has previously been also named as Satori IoT botnet (another Mirai variant discovered late last year), is usually “very different” through Satori despite having several similar characteristics, as explained in a Reddit thread.

Record-Breaking DDoS? The Calm Before The Storm

IoTs are currently being deployed in a large variety of devices throughout your home, businesses, hospitals, along with also even cities (smart cities), however they’re routinely being hacked along with also used as cyber weapons due to lack of stringent security measures along with also insecure encryption mechanisms.

If you are unaware, the earth’s largest 1 Tbps DDoS attack so far was launched through just 152,000 infected IoT devices using Mirai botnet, along with also in a separate attack, just 100,000 devices took down the common DynDNS service in late 2016.

Since Okiru has been ported to target a completely new range of millions of “expectedly insecure” devices running ARC processors, the DDoS attack going to be generated by Okiru botnet would certainly probably be the biggest cyberattack ever.

“through This kind of day, the landscape of #Linux #IoT infection will change. #ARC CPU has produced #IoT devices more than 1 billion per year. So these devices are what the hackers want to aim to infect #ELF #malware with their #DDoS cannons. that will’s a serious threat will be,” Odisseus tweeted.

The fresh arrival of ARC-based IoT devices into botnet scheme will exponentially raise the number of insecure devices to an unprecedented size, producing that will easy for hackers to gain control over a large number of poorly configured along with also vulnerable IoT devices.

Article Categories:
Security Hacks

Leave a Comment

Your email address will not be published. Required fields are marked *

7 + nine =