• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   IOT

Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902

  • Posted on:July 28, 2020 at 4:57 am
  • Posted in:Botnets, Exploits, Vulnerabilities
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

We found an internet of things (IoT) Mirai botnet downloader exploiting CVE-2020-5902 in the wild, two weeks after getting a 10 out of 10 CVSS rating in its disclosure. Analyzing the said variant, it can also abuse nine other recently discovered security bugs in other devices.

Read More
Tags: botnetCVE-2020-5902ExploitF5 Big-IPinternet of thingsIOTMiraisoravulnerability

DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet

  • Posted on:December 16, 2019 at 5:31 am
  • Posted in:Botnets, Exploits, Internet of Things
  • Author:
    Trend Micro
0

We found new details on the tools and techniques the Momentum botnet is currently using to compromise devices and perform distributed denial-of-service (DDoS) attacks, and propagate with numerous exploits.

Read More
Tags: botnetIOTMomentumrouterVulnerabilities

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

  • Posted on:September 13, 2019 at 5:02 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

We’re always eager for new research and learning opportunities, but this time, serendipitously, the opportunity found us. At the closing party of the Hack In The Box Amsterdam conference — where we presented our industrial radio research and ran a CTS contest — we were given LED wristbands to wear. They’re flashing wristbands meant to enhance the experience of an event, party, or show. At the beginning, we were not interested in the security impact; we just wanted to learn. Later on, however, we discovered that the RF link was used to transport an industrial protocol: DMX512 (Digital MultipleX 512), the same protocol used to pilot large light exhibitions.

Read More
Tags: iiotIOTradio frequencyRFIDSoftware Defined Radio

IoT Attack Opportunities Seen in the Cybercrime Underground

  • Posted on:September 10, 2019 at 2:37 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

We looked into IoT-related discussions from several cybercrime underground communities and found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. For this entry, we provide an overview of what cybercriminals see as perfect openings for attacks on IoT technologies.

Read More
Tags: cybercrime undergroundiiotindustrial internet of thingsinternet of thingsIOT

Keeping a Hidden Identity: Mirai C&Cs in Tor Network

  • Posted on:July 31, 2019 at 5:12 am
  • Posted in:Botnets, Internet of Things, Malware
  • Author:
    Trend Micro
0

We found new samples of Mirai targeting IP cameras and DVRs with exposed ports and default credentials. Like its predecessors, it allows attackers remote access and the use of infected devices to form a botnet for DDoS attacks. However, the C&Cs were traced back to the Tor network, keeping the cybercriminals’ identities anonymous and protecting the servers from being shut down despite discovery.

Read More
Tags: IOTMiraiTor
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.