sb-as logo
Story image

Mirai botnet now targeting Windows PCs to access IoT devices

15 Feb 2017

Notorious IoT malware ‘Mirai’ has now jumped ship to infect Windows devices and Symantec is warning users to make sure they have internet security to make sure they don’t get caught.

Symantec says the malware used to infect Linux systems, as they are what many IoT devices use. However, security researchers found a version that can now infect Windows computers and spread to IoT devices on the network.

“The Windows version of Mirai will attempt to connect to those devices through potentially open ports. These ports could simply be other Windows machines or they may be connected devices. Upon connecting successfully and determining that the platform is Linux based, it will turn that particular device into a DDoS bot in the Mirai botnet,” Symantec said in a blog.

The sheer breadth of Windows usage (more than one billion PCs are running all Windows versions) means that Mirai is able to spread its malware more widely.

In October 2016, the Mirai malware originally turned IoT devices into botnets and struck everything from DVRs, security cameras and more. 

The malware accessed devices using default usernames and passwords, and then took control to turn the botnet devices into weapons that conducted a Distributed Denial of Service (DDoS) attack. The attack brought down one of the largest global hosting companies, and its clients, for hours.

Symantec says the IoT trend will keep rising, and now any connected device, whether it’s a toaster or Bluetooth door lock, is now its own computer subject to its own security issues.

The company suggests that users must protect their Windows computers. 

Story image
Ransomware and Microsoft Exchange attacks surging 
There are global surges in ransomware attacks alongside increases in cyber attacks targeting Microsoft Exchange Server vulnerabilities, according to Check Point Research.More
Story image
Thycotic releases new integrations to bolster account governance
“Service accounts are often left defenceless, even by enterprises with established programs for privileged user security."More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
Fujitsu, Trend Micro team up to secure private 5G
"We believe that this security solution represents a key technology for applying private 5G to mission-critical areas."More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More