Hackers use 26 vulnerabilities to spread Echobot malware targeting IoT devices

Users who are concerned about security information should probably remember MIRAI a few years ago, the MIRAI worm is still the world’s wildest IoT virus until now. In the past, MIRAI used the Internet of Things devices such as cameras and camcorders to form a huge botnet to launch attacks on operators in the US East. Although the MIRAI-based variants of the virus have been very crazy for the past few years, the latest EchoBot was discovered based on MIRAI.

The MIRAI worm of that year mainly relied on the weak passwords of various IoT devices to infect, which is a weak password. In fact, many devices use the default password. It is also true that this worm was quickly gaining popularity from hackers after it was opened source. Until now, many hackers have developed new worms with their source code. The malware named EchoBot was recently detected. It is shocking that virus developers have collected and used more than 26 vulnerabilities to spread.

Image: Akamai

The original MIRAI relied on weak passwords only for vulnerabilities, while EchoBot used to collect vulnerabilities from major vendors to add vulnerabilities to the attack program. Devices that may be infected include NAS attached network storage, routing, cameras, camcorders, servers, and a large number of home IoT devices. However, the EchoBot virus has only infected the IoT device without further action, so it is not clear whether there will be other malicious purposes.

Via: ZDNet