IoT malware targeting zero-day vulnerabilities


Once it became evident that IoT devices can be relatively easily enslaved in botnets and that even their limited power can be used for a variety of nefarious purposes, it was open season for malicious actors.

First, they targeted IoT devices with default or weak passwords, and manufacturers and users began changing them. Then they used known vulnerabilities, and IoT vendor increased their efforts to push out patches. Now, some of the botmasters are making a concentrated effort to find unknown flaws they can exploit.

One of these is the person (or persons) behind the Satori malware, which is based mainly on Mirai code.

Read full news article on Help Net Security