mirror of https://github.com/MISP/misp-galaxy
add Persirai botnet
parent
50fecccf39
commit
7cf37a57f1
|
@ -900,7 +900,17 @@
|
||||||
"https://www.bleepingcomputer.com/news/security/new-iot-botnet-torii-uses-six-methods-for-persistence-has-no-clear-purpose/"
|
"https://www.bleepingcomputer.com/news/security/new-iot-botnet-torii-uses-six-methods-for-persistence-has-no-clear-purpose/"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Persirai",
|
||||||
|
"description": "A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that caused some of the most notable incidents of 2016 via Distributed Denial-of-Service (DDoS) attacks that compromised IoT devices such as Digital Video Recorders (DVRs) and CCTV cameras—as well as the Hajime botnet.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://blog.trendmicro.com/trendlabs-security-intelligence/persirai-new-internet-things-iot-botnet-targets-ip-cameras/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 14
|
"version": 15
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue