The Mirai botnet has affected hundreds of thousands of internet of things (IoT) devices since it first emerged in the fall of 2016. With its original malware and countless spinoffs, Mirai has kept security professionals busy and launched a new era of IoT security threats.
Understanding what happened with Mirai -- and what is still happening -- can go a long way to strengthening distributed denial-of-service (DDoS) attack defense. This guide is a collection of the most important events and takeaways from the outbreak of the Mirai botnet and its variants.
What's new with the Mirai botnet
Recent events around Mirai relate to the legal and technical fall out -- accused creators and operators of the botnet are facing charges; the industry is calling for better, more secure IoT designs; and the next generation of the Mirai botnet is taking shape and wreaking havoc.
The Department of Justice announced guilty pleas from the three Mirai creators and operators behind the massive worldwide botnet DDoS attacks in 2016. Continue Reading
News roundup: Okiru, a new Mirai variant, could put over 1.5 billion devices at risk of a botnet. Plus, G Suite Enterprise now comes with a security center, and more. Continue Reading
A variant of the Satori botnet, a successor of the IoT device hijacking Mirai botnet, is designed to hijack cryptocurrency mining operations, syphoning off newly created digital coins Continue Reading
News of a 100,000 device strong IoT botnet that could cripple the internet has sparked a fresh call for manufacturers of IoT devices to do more to ensure they cannot be hijacked for malicious purposes Continue Reading
A year after the first Mirai botnet attacks, the global botnet has grown, with many countries and cities unwittingly hosting large number of bot-infected devices Continue Reading
2Mirai botnet variants-
The threat doesn't end with Mirai
Hackers have leapt through the window Mirai opened and created spinoffs of the original malware. Different malware instances and botnets used Mirai as a starting point and implemented new functionality to target routers and other IoT devices.
BrickerBot is similar to other IoT malware like Mirai, Hajime and others. Expert Judith Myerson explains what makes BrickerBot different, and what can be done to defend against it. Continue Reading
Hajime malware was discovered to have links to the Mirai botnet that launched powerful DDoS attacks last year. Expert Nick Lewis explains how Hajime differs from Mirai. Continue Reading
Researchers said a modified version of the Mirai botnet code has been attacking routers by exploiting a specific vulnerability and may leave millions at risk. Continue Reading
Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
3The history of Mirai-
How the threat of the Mirai botnet got so bad
From the Dyn disruption that took down part of the internet to the botnet attack on the largest telecom company in Germany, here is a look at the early history of the Mirai botnet and how it put the world on notice.
Mirai, the IoT botnet malware code used in the massive DDoS attack on Brian Krebs' website, has been released to the public and highlights a problem of using default passwords. Continue Reading
As more details emerge on last week's massive Dyn DNS DDoS, new analysis indicated as few as 100,000 Mirai IoT botnet nodes were enlisted in the incident and reported attack rates up to 1.2 Tbps. Continue Reading
German telco says its broadband outages are linked to a botched attempt to hijack routers, which security experts say further underlines the cyber threat to internet connected infrastructure Continue Reading
The Federal Trade Commission filed a lawsuit against D-Link, and experts said the move was likely to push more secure routers in the wake of the Mirai botnet attacks. Continue Reading
News roundup: U.K. authorities arrested a suspect in the Mirai malware attack on Deutsche Telekom. Plus, a judge denies a government request to collect fingerprints, and more. Continue Reading
4Botnet mitigation strategies-
How to stop the Mirai botnet in its tracks
Since hackers were able to cause such widespread disruption with Mirai, the security industry was forced to develop new tactics and defenses for these massive DDoS attacks. These are the lessons the world has learned and the options available to mitigate the effects of another Mirai botnet.
An IoT botnet attack on Huawei home routers showed similarities to the Mirai malware. Expert Judith Myerson explains the threat and how enterprises can protect themselves. Continue Reading
Corero Network Security's Dave Larson talks with SearchSecurity about how the Mirai botnet attacks have forced companies to change their DDoS mitigation strategy. Continue Reading
Enterprise anti-botnet defenses, to be effective, must be added in multiple layers. No single security product will do the trick, but the right combo of tools can. Continue Reading
5Definitions to know-
Get familiar with the terminology
If you want to understand what happened with the Mirai botnet attacks, get to know the terminology.