"New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices"

A new variant of the Mirai botnet has been discovered using multiple security flaws to spread to Linux and Internet of Things (IoT) devices. Discovered during the second part of 2022, the latest variant has been named V3G4 by Palo Alto Networks Unit 42, which identified three different campaigns likely carried out by the same threat actor. Once infected, the vulnerable devices would be fully controlled by the attackers and become part of the botnet, according to Unit 42 researchers. The threat actor is able to use these devices to execute additional attacks, including Distributed Denial-of-Service (DDoS) attacks. The adversary uses as many as 13 vulnerabilities that could result in Remote Code Execution (RCE) in targeting servers and networking devices running Linux. Atlassian Confluence Server and Data Center, DrayTek Vigor routers, Airspan AirSpot, Geutebruck IP cameras, and more, include the exploited vulnerabilities. This article continues to discuss the new Mirai botnet variant V3G4. 

THN reports "New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices"

Submitted by Anonymous on