|
“Three years after Mirai first appeared, and two years after WannaCry, it shows that we still haven’t solved the problems leveraged in those outbreaks,” said F-Secure Principal Researcher Jarno Niemela. “The insecurity of the IoT, for one, is only getting more profound, with more and more devices cropping up all the time and then being co-opted into botnets. And the activity on SMB indicates there are still too many machines out there that remain unpatched.” According to the new report, Attack Landscape H1 2019, detailing traffic measured by F-Secure’s global network of honeypots, the number of attack events measured from January through June was twelve times higher when compared with the same period in 2018—an increase primarily driven by IoT-related traffic.
— Where are these attacks taking place? “Populating the top ten list of attack source countries for H1 2019 are, as usual, the US, Russia, Germany and China. However, this is the first time that traffic volumes from the Chinese IP space has overshadowed other countries to take top spot.”
— Mirai malware still going strong. “Malware found in the honeypots is dominated by various versions of Mirai, which is still going strong three years after it first burst onto the scene in 2016. Mirai targets IoT devices such as IP cameras and routers, infects those using default credentials, and co-opts them into botnet armies.”
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix