March 20, 2019 By David Bisson 2 min read

Researchers spotted a new Mirai variant targeting presentation systems and display devices commonly used by businesses.

Palo Alto Networks first observed the new variant in January 2019. The researchers quickly noted that the version of the infamous internet of things (IoT)/Linux botnet wasn’t just capable of targeting common IoT devices such as routers, IP cameras and network storage devices; it also came equipped with exploits for both WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs. Enterprises are the primary users of these technologies, which could signify that Mirai is adjusting its range of targets to include businesses.

Of the 27 exploits that came with this latest Mirai variant, 11 were new. The campaign used the compromised website of a Colombian business specializing in “electronic security, integration and alarm monitoring” to host its malicious payload.

The Latest Marai Variant to Hit the Botnet Scene

This is just the latest in a long string of Mirai variants to emerge in recent years. In March 2017, Imperva discovered a new version that had improved its ability to launch application-layer distributed denial-of-service (DDoS) attacks. Less than a year later, Infosecurity Magazine reported on the birth of Okiru, a Mirai member known for targeting ARC processors.

In the next six months, a cybercriminal released a link with the source code for seven new Mirai variants, as shared by Avast. Symantec spotted a version of the malware leveraging an open-source project as part of its attack campaigns a month later.

Strengthen Your Password Management and Incident Response

Security professionals should set up password managers to store strong, complex passwords for all corporate devices, including IoT assets. This should be part of a broader policy-based approach to password management across the organization. Lastly, security leaders should create an incident response team to help patch vulnerable IoT devices and disclose any security events involving those products should they occur.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today