Mirai botnet example

You are here:
Estimated reading time: < 1 min
You might have heard “Mirai botnet” before, for a further explanation we have published an article dedicated just for this: 

Because of the request pattern, the time gap, and the huge number of dynamic addresses, we think the backbone of this botnet mainly consists of routers and other IoT devices.  And with high probability, it was caused by a variant of Mirai botnet, because as you know, these infected devices are often captured by Telnet Port Honeypots as well.

Below you can see an example, how it looks like in real life : 

Date: 2018-01-17 16:00:54
Attacker ip:
{    "PORT HIT": ">",   
 "MESSAGES": "Array  
 (        [16:00:22] => cat /proc/mounts; (/bin/busybox AYUCX || :)    )  
Date: 2017-11-14 12:11:17
Attacker ip:
{    "PORT HIT": ">",  
"MESSAGES": "Array    (        [11:10:42] => cat /proc/mounts; (/bin/busybox PVOHL || :)       )   
Was this article helpful?
It was not helpful
Views: 303