From 73e14c53eb69bb609f2f59fcf335191981e4db1c Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Wed, 4 Apr 2018 16:22:50 +0200 Subject: [PATCH] complete hajime botnet --- clusters/botnet.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/botnet.json b/clusters/botnet.json index 000de47..60a1ce1 100644 --- a/clusters/botnet.json +++ b/clusters/botnet.json @@ -532,7 +532,7 @@ }, { "value": "Hajime", - "description": "Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 in a public report by RapidityNetworks. One month later we saw the first samples being uploaded from Spain to VT. This worm builds a huge P2P botnet (almost 300,000 devices at the time of publishing this blogpost), but its real purpose remains unknown. ", + "description": "Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 in a public report by RapidityNetworks. One month later we saw the first samples being uploaded from Spain to VT. This worm builds a huge P2P botnet (almost 300,000 devices at the time of publishing this blogpost), but its real purpose remains unknown.\nIt is worth mentioning that in the past, the Hajime IoT botnet was never used for massive DDoS attacks, and its existance was a mystery for many researchers, as the botnet only gathered infected devices but almost never did anything with them (except scan for other vulnerable devices).", "meta": { "refs": [ "https://www.bleepingcomputer.com/news/security/hajime-botnet-makes-a-comeback-with-massive-scan-for-mikrotik-routers/",