Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Wednesday, January 03, 2024]

Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Wednesday, January 03, 2024]
Report

Unveiling the Mirai: Insights into Recent DShield Honeypot Activity

Description :
The method in which Mirai infiltrated numerous IoT devices was through common vulnerabilities, such as weak and default username and password combinations. Once Mirai gains access to a system, it carries out its primary function – to enslave devices and coordinate them for massive Distributed Denial of Service (DDoS) attacks.

Published Created Modified
2024-01-03 16:02:41 2024-01-03 16:02:41 2024-01-03 16:19:45

Tags

Indicators

Hashes :
  • b023af46798a045ce9606318928ed9a96bd64bc25c7279a08b5fee38176e5dc9
  • 5466d9405031060ffb564f14b5a263eda12e179287ca4a4a7c94501cd6a25c53
MITRE ATT&CK Techniques :

External References

You can download the txt file containing the indicators by clicking on the button below:

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.