Kevin Tibbets’ Post

View profile for Kevin Tibbets

Cyber Threat Intelligence | DFIR | Leading Teams and Initiatives

The cybersecurity landscape is evolving rapidly, and a new Mirai botnet variant is raising alarms. 🛡️ The Gayfemboy botnet, rooted in Mirai, has exploited critical zero-day vulnerabilities in routers, notably CVE-2024-12856 affecting Four-Faith devices. Key facts: - Over 15,000 devices infected and daily active bots maintained. - Exploitation of known vulnerabilities (CVE-2013-3307, CVE-2014-8361) and weak Telnet credentials fuels its presence. - Targets include routers from ASUS, Kguard DVRs, and various smart home devices. - The botnet orchestrates DDoS attacks, data exfiltration, and possibly cryptocurrency mining. This botnet isn’t just a basic threat; it features advanced capabilities, deploying a modified UPX shell and proactive countermeasures against research efforts.  Act swiftly:  - Patch vulnerable routers immediately, especially those from Four-Faith and ASUS. - Monitor devices for unusual activity and implement intrusion detection systems.

To view or add a comment, sign in

Explore topics