My Viral Box Logo
Ad image
  • Funny Stories
  • Weird Stories
  • Scary Stories
  • Ghost Stories
  • Funny Riddles
  • Short Jokes
Reading: Botnet Mirai began mining bitcoins on DVR and video cameras / Geektimes
Share
MYVIRALBOX MYVIRALBOX
Font ResizerAa
  • Funny Stories
  • Weird Stories
  • Funny Riddles
  • Ghost Stories
  • Scary Stories
Search
  • Funny Stories
  • Weird Stories
  • Scary Stories
  • Ghost Stories
  • Funny Riddles
  • Short Jokes
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
MYVIRALBOX > Funny Stories > Botnet Mirai began mining bitcoins on DVR and video cameras / Geektimes
Funny StoriesWeird Stories

Botnet Mirai began mining bitcoins on DVR and video cameras / Geektimes

MyViralBox Staff
Last updated: April 25, 2024 3:36 pm
MyViralBox Staff
Published April 12, 2017
Share
6 Min Read
SHARE

Botnet

IBM X-Force employees discovered a variant of the Trojan ELF Linux / Mirai, which is equipped with a new module for bitcoin mining. As before, a worm with worm functionality searches for and infects vulnerable devices with Linux operating system connected to the Internet bitnet: digital video recorders, set-top boxes, video surveillance cameras, IP cameras and routers.

Botnet Mirai began mining bitcoins on DVR and video cameras / Geektimes However, to conduct a profitable DDoS attack, you need to find a customer or a suitable victim who will agree to pay money for stopping the attack (the service is positioned as consulting in the field of information security, protection from DDoS, you can conclude an agreement). Finding clients and victims for an attack is a constant job that takes a lot of time. On the other hand, mining of bitcoins gives a constant passive income and does not require any effort.

It’s unlikely that hackers will earn a lot of money on mining. Even hundreds of thousands of set-top boxes and surveillance cameras can not cheat any significant number of hashes. The owners of the botnet will earn a few Satoshi. But even a few Satoshi are better than nothing, because the botnet is still idle.

On Internet devices, a hasht is simply ludicrous. No one even measured it. It is known that on the Cortex-A8 processors the hashed is 0.12-0.2 Mheshs / ​​s, and on Cortex-A9 – 0.57 Mhesha / s. On most set-top boxes the processors are weaker.

Recall that the worm and botnet Mirai made a lot of noise in September-October 2016. Due to the fact that the worm automatically went through standard login-password combinations, it managed to spread to hundreds of thousands of devices (security cameras, routers, digital set-top boxes and DVR), from which it organized several DDoS attacks. The power of these attacks far exceeded the capabilities of standard botnets from PCs, because conventional computers are much more difficult to infect in such numbers.

One of the first victims of the Mirai botnet in September of last year was journalist Brian Krebs, who specializes in information security topics and Deanonimization of hackers. The traffic to its provider in its peak reached 665 Gbps, which was one of the most powerful DDoS attacks in the history of the Internet. Brian had to move the site offline, because Akamai brought the site out of DDoS-protection, so as not to jeopardize its other customers.

In September-October 2016, the botnet was used to attack the French hosting provider OVH and for a powerful DDoS attack on Dyn, which provides network infrastructure and DNS services for key US organizations. In this case, the flow of garbage requests from tens of millions of IP addresses was about 1 Tb / s. Users around the world had problems accessing the sites of Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix and others. In fact, the Mirai botnet temporarily “put” a small segment of the American Internet.

In November, a new version of Mirai attacked several models of Zyxel and Speedport routers from users of the German Internet provider Deutsche Telekom. As the investigation of Kaspersky Lab showed, the modified version of the worm in this case used a new method of distribution – through the specialized protocol TR-064, which is used by providers for remote management of user devices. In the event that the management interface (on port 7547) is accessible from the outside, it becomes possible either to load and execute arbitrary code on the device, or to do the same, but through the stage of opening access to the traditional web interface.


The web console of the dropper Mirai. Screenshot: IBM X-Force

In September-October 2016, a real war broke out between the hackers for controlling the Mirai botnet after a vulnerability was found in the worm’s code. Although Brian Krebs eventually managed to deanonize the authors of the original version of Mirai, it is very likely that now control of the botnet belongs to other hackers – one or more groupings.

A new version of Mirai with a built-in miner probably belongs to one of those Groupings that are fighting for control of the botnet. The activity of this version of the malware was noted for several days at the end of March.

It is reported that the worm is spreading the old methods: scanning the address space in search of new devices that work on Telnet ( Port 23), and selecting passwords for them. Dangers are susceptible to devices under Linux with all versions of BusyBox and DVRHelper, if they have standard passwords installed.

MyViralBox Staff
MyViralBox Staff

You Might Also Like

15 of the Most Revealing Pics of Emily Ratajkowski

On knees. How to choose a bandage knee / Blog company Medgadgets / Geektimes

Ergo platform concept and decentralized exchange – another Moscow Blockchain Developers Meetup will be held on April 25

A script for stealing a PIN code via a smartphone / Geektimes browser

The developer of "smart" credit cards Plastc collected pre-orders for $ 9 million and declared bankruptcy

1 Comment 1 Comment
  • Pingback: Rating of cameras according to the quality of pictures 2016-2017

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search Posts

‎‎‎‎‎Explore Our Categories

  • Funny Riddles9
  • Funny Stories524
  • Ghost Stories3
  • Scary Stories19
  • Short Jokes1
  • Weird Stories477
Ad image

Latest added

Weirdest Players in Arsenal FC History
Weird Stories

14 Weirdest Players in Arsenal FC History: Strange Stories and Quirky Characters

May 11, 2025
weird football formations
Weird Stories

7 Weird Football Formations That Actually Worked

May 11, 2025
weird business ideas
Weird Stories

15 Weird Business Ideas That Actually Work

May 3, 2025
funny profile pics
Funny Stories

Funny profile pics to make you laugh

April 23, 2025
World Cup moments
Weird Stories

Weird World Cup Moments: 12 Unforgettable Controversies

April 14, 2025
good luck rituals
Weird Stories

21 Weird Good Luck Rituals from Around the World

April 11, 2025

Explore More

  • Privacy Policy
  • Submit Your Silly Stories

Follow US on Social Media

Facebook Instagram Pinterest Envelope-open

My Viral Box Logo

About My Viral Box

MyViralBox brings together all the weird, wacky, scary and funny news from around the web in one place to brighten your day. You might scratch your head; you might laugh out loud; you might glance over your shoulder; but you’re gonna have fun whenever you drop by. Funny news, weird news, chill-inducing spookiness, jokes and riddles of all kinds, plus whatever else we come across that we think just has to go viral; you’ll find it all right here!

© My Viral Box. All Rights Reserved.

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?