Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


TeamViewer issues emergency fix for desktop access vulnerability

The dangerous bug allowed attackers to seize control of PCs through desktop sessions.

TeamViewer issues emergency fix for desktop access vulnerability

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Problems Reappear for IoT Device Owners with Discovery of New DDoS Trojan  (Read 483 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 23076
  • .: Surf Queen
    • WWW
Problems Reappear for IoT Device Owners with Discovery of New DDoS Trojan
30 October 2016, 10:55 pm

A new malware family written by what appears to be an experienced coder is aiming for Linux-based IoT devices, with the main purpose of adding those devices to a botnet and carrying out DDoS attacks.

Discovered by security researcher MalwareMustDie, this new malware family is named Linux/IRCTelnet and is written in C++.

The researcher says the malware works by infecting Linux-based devices that expose Telnet ports to the Internet and use weak passwords.

IRCTelnet borrows from other IoT malware

IRCTelnet brute-forces a device's Telnet ports, infects the equipment's OS, and adds it to a botnet that's controlled through IRC. This means that every infected bot connects to an IRC channel, and reads commands posted in the main chatroom.

The concept is not new by any stretch of the imagination, with many IoT, Linux, and Windows malware operating in the same ... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks