"Pro-Russian Hackers Boost Capacity with Mirai Variants"

The pro-Russian hacking group Zarya, which previously operated under Killnet's wing, has begun using variations of the Mirai malware to bolster its offensive capabilities. Hacktivist groups who support Russia's invasion of Ukraine are increasingly cooperating to boost the power of Distributed Denial-of-Service (DDoS) botnets that target organizations supporting Kyiv. According to researchers at the cybersecurity company Radware, the pro-Russian hacktivist group Zarya has begun creating its own version of the Mirai malware to recruit additional online devices. The Mirai botnet, which was first discovered in 2016, used malware that infected Linux-operated devices and then spread itself through open Telnet ports to other machines. Since then, the botnet operators have attempted to expand their capabilities using variations of Mirai. Zarya appears to have befriended threat actors from Akur Group, a hosting provider for pro-Russian hacktivist groups. Akur hosts Zarya's propaganda website, as well as the collective's campaign log and malware. Daniel Smith, the head of research for Radware's threat intelligence division, says Zarya's tactics indicate a more advanced phase of the cyber conflict that has been ongoing since February 24, 2022, when Moscow's tanks invaded Ukraine. Researchers recently discovered Zarya's attempts after detecting a compromised server in Vietnam trying to exploit a known vulnerability through Radware's honeypot. The vulnerability enables threat actors to conduct Remote Code Execution (RCE) attacks on MVPower CCTV DVR devices, thus allowing them to hack into and take control of the digital video recording equipment. This article continues to discuss Zarya using variants of Mirai malware to enhance its offensive capabilities. 

Cybernews reports "Pro-Russian Hackers Boost Capacity with Mirai Variants"

Submitted by Anonymous on