Mirai is a malware that infects devices that run on ARC processors, turning them into a network of remotely controlled bots. This network of bots is called a botnet and is often used to launch DDoS attacks. Mirai scans the Internet for IoT (Internet of Things) devices that run on the ARC processor. This processor runs a version of the Linux operating system. If the given username and password combination is not changed, it is able to log into the device and infect it.

The Mirai employed a hundred thousand hijacked IoT devices to bring down Dyn. The Creators of Mirai Botnet were then 21 year old Paras Jha and 20 year Old Josiah White, who co-founded Protraf Solutions, a company offering mitigation services for DDoS attacks. This was a classic case of racketeering: Their business offered DDoS mitigation services to the very organizations their malware attacked. Paras Jha loved anime and posted online under the name "Anna-Senpai; he named the malware Mirai (Japanese for "the future"), after the anime series Mirai Nikki, or "future diary." It encapsulated some clever techniques, including the list of hardcoded passwords. When Mirai was discovered in September 2016, Akamai was its first target. Mirai's first big attack came on September 19, 2016, and was used against the French host OVH because, as it later turned out, OVH hosted a popular tool that Minecraft server host uses to fight against DDoS attacks. A few days later, "Anna-Senpai" posted the code of the Mirai botnet online - a uncommon technique that gives malware creators plausible deniability, because they know that copycats will use the code, and it will become increasingly difficult to find out who created it first. The big attack on 12th October was launched by someone else against Dyn, an infrastructure company that offers DNS services to a lot of websites. The FBI believes that the attack was ultimately targeting Microsoft game servers. The Mirai is mutating. It has launched both HTTP flood and Network Level Attacks. Though its original creators have been caught, their source code is live. Mirai has given birth to variants such as the Okiru, the Satori, the Masuta and the PureMasuta. A concern for the future is the discovery of the powerful botnet named IoTrooper or Reaper which is able to compromise IoT devices at a much faster rate than Mirai.
Here's how you can keep your network safe https://www.thehackerforum.com/post/network
Here's how you can stay secure online https://www.thehackerforum.com/post/anonymity
Here's the USB Rubber Duck tutorial https://www.thehackerforum.com/post/usbducky
Here's the compete guide to start hacking https://www.thehackerforum.com/post/hacking
Comentarios