Tuesday, April 15, 2025
HomeBotnetDangerous Mirai Botnet Attack Attempts Detected Again from 9,000 Unique IP Addresses

Dangerous Mirai Botnet Attack Attempts Detected Again from 9,000 Unique IP Addresses

Published on

SIEM as a Service

Follow Us on Google News

Internet-of-Things (IoT) based very dangerous Mirai Botnet attack rapidly raised again in South America and North Africa countries that were detected by increasing the huge Traffic on ports 2323 and 23.

Mirai is a malware that turns networked devices running Linux into remotely controlled “bots” that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers.

Earlier in this year Mirai botnet also available online for rental any one can purchase it this Dark web Market place.

The DDoS bots used in the attack were hiding behind different user-agents than the five hardcoded in the default Mirai version.This–and the size of the attack itself–led us to believe that we might be dealing with a new variant, which was modified to launch more elaborate application layer attacks.
- Advertisement - Google News

This newly emerging Mirai Attack mainly targeting IP cameras, digital video recorders (DVRs), network video recorders (NVRs), as well as modems.

Also Read:  Mirai Variant Launches 54 Hours DDoS Attack Generated 2.8 Billion Requests in US college

some of detected IoT attack attempt by this new ware of Mirai.

Log-in NamePasswordDevice
adminCenturyL1nkZyXEL PK5001Z
adminQwestM0demZyXEL PK5001Z
rootvizxvDahua IPC-HFW4300S
rootxc3511Xiong Mai Technology IP cam, DVR, NVR
Wprootcat1029Tenvis TH692 Outdoor P2P HD Waterproof IP Camera

Recent of Series Mirai attempt Detected in Colombia, Ecuador, Panama, Egypt, and Tunisia, as well as more activity in Argentina.

Colombia is the main target for this Mirai bots and the second wave of attack attempts, with Ecuador, Argentina, Egypt, and Tunisia showing similar patterns.

End of the November 2017, it Rose the number of botnet counts raipdly and 371,640 attack attempts were detected coming from roughly 9,000 unique IP addresses.

This attempt frequently attempting the botnet attacks first wave (Argentina) and the second wave (Colombia and Panama):

Mirai Botnet
Mirai Botnet

First attempt started on November 22, as we see in the first graph shows Argentina was the first wave of targeting.

This attempt keeping running until hitting below 1000 attempt and the second wave of attack attempts started on November 29.

the second wave of attack in Colombia is, even more, higher than Argentina hits and the highest recorded single-hour attack attempts occurring in Colombia (80,825 at 19:00 UTC).

Mirai IP tracking report revealed that most of the attempt has been registered from same region and attacker mostly located in the same area.

Apart from this Attacker attempting this distribution into five primary countries that were the main focus of the second wave.

The first wave of attempt that was started on Nov 22 has peaked at 24,716 hits but the second wave of attempt peaked at 56,748 in a single hour on November 29.

According to Trend Micro Report, the attackers are still trying to exploit ZyXEL modems as entry points using Mirai Botnet, along with other devices that were not seen in the earlier attacks targeting Argentina – in particular, the Tenvis TH692 Outdoor P2P HD Waterproof IP Camera.

Security Expert still analyzing this two wave are connected or not continuously monitoring the attempt this Mirai Attack in the Different region.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video...

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

“Eleven11bot” Botnet Compromises 30,000 Webcams in Massive Attack

Cybersecurity experts have uncovered a massive Distributed Denial-of-Service (DDoS) botnet known as "Eleven11bot."This new...