Saturday, May 10, 2025
HomeIoTMost Dangerous IoT Malware Mirai Now Using C&C Server in the...

Most Dangerous IoT Malware Mirai Now Using C&C Server in the Tor Network For Anonymity

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered new Mirai Malware samples with the updated functions, in which malware authors implemented its Command & Control server in the Tor Network for anonymity.

Mirai is one of the notorious IoT Malware that targets the IoT devices such as IP cameras and DVRs to take control of those devices by taking advantages of open ports and default credentials, exploiting disclosed and non-disclosed vulnerabilities and add them in botnet network.

Threat actors placed a command and control (C&C) server in the Tor network that never seen in any of the previous version of Mirai.

- Advertisement - Google News

Hide the C&C server communication via Tor helps to avoid detection and stop reporting in surface web to take down the C&C server.

A sample that discovered by Trend Micro researcher contains four C&C servers with 30 hard-coded IP address that was isolated by researchers in a sandbox environment.

“Results indicate that it sent a specific sequence of “05 01 00”, a socks5 protocol initial handshake message. Next, researchers sent the message to the servers and got the socks5 response “05 00” from the majority of the addresses, confirming that they were socks proxies to the Tor network.”

Further research reveals that the malware establishes the connection with socks5 and queries it to relay packets to a C&C server using an address nd3rwzslqhxibkl7[.]onion:1356 on Tor and it also tries to connect with other proxies if it failed.

Researchers also compared with an older version by connecting to the C&C using a Tor proxy in a testing environment and the results confirm the same login prompt used in old versions of Mirai.

Infection Process

New Mirai sample scanning the TCP ports 9527 and 34567 to find the unprotected IP cameras and DVRs for remote access and control. 

Along with scanning it also sprays the default credentials on infected hosts, and the communication protocols were used by the attackers also used in previous Mirai variant.

Researchers from Trend Micro discovered a DDoS command sent from the C&C server via a UDP flood attack on a specific IP address.

“We find this particular sample interesting for the attackers’ decision to place the C&C server in Tor, likely to evade tracking of its IP address and avoiding being shut down when reported to domain hosts.”  Trend Micro said.

Another distribution server was discovered and the sample is designed to attack large scale networks. “so users and enterprises are recommended to update their network systems and devices with the latest patches and to change default credentials with complex passwords and apply multiple authentication systems to prevent unauthorized access. “

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai

Mirai Botnet Creators To Help Law Enforcement Agencies On Cybercrime Investigations

New Variant of Mirai Malware Using 13 Different Exploits to Hack Routers Including D-Link, Linksys, GPON, Netgear, Huawei

New Mirai Malware Attack on Enterprise Wireless Presentation systems and Supersign TVs

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into...

New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources

Cybersecurity researchers at Palo Alto Networks' Unit 42 have uncovered a novel obfuscation method...

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks

A persistent and highly sophisticated malvertising campaign on Facebook has been uncovered by Bitdefender...

Threat Actors Target Job Seekers with Three New Unique Adversaries

Netcraft has uncovered a sharp rise in recruitment scams in 2024, driven by three...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources

Cybersecurity researchers at Palo Alto Networks' Unit 42 have uncovered a novel obfuscation method...

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks

A persistent and highly sophisticated malvertising campaign on Facebook has been uncovered by Bitdefender...

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known...