New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices

December 4, 2023 at 06:54AM Cybersecurity experts have uncovered a new version of the P2PInfect botnet targeting routers and IoT devices, now able to infect devices using MIPS architecture. First identified in 2023 exploiting a critical Redis vulnerability, P2PInfect has evolved with evasion tactics and now includes a Windows DLL module, indicating a sophisticated threat … Read more

Attacks Against South African ICS and IoT Systems Steadily Decrease

November 28, 2023 at 12:57PM In Q3 2023, cyberattacks on industrial and IoT systems in African nations decreased compared to earlier this year. According to the meeting notes, it was observed that all African nations experienced a decrease in the number of cyberattacks on industrial and IoT systems during the third quarter of 2023 when … Read more

Exploring Weaknesses in Private 5G Networks

November 23, 2023 at 10:48AM Private 5G networks are at risk due to a vulnerability in the GPRS Tunneling Protocol User Plane (GTP-U). The lack of encryption and authentication mechanisms in this critical link allows attackers to breach private 5G networks through packet reflection. To mitigate this risk, organizations should implement robust security protocols, firewalls, … Read more

Mozi botnet murder mystery: China or criminal operators behind the kill switch?

November 1, 2023 at 04:04PM The Mozi botnet, which accounted for 90% of all malicious IoT network traffic, has disappeared after a kill switch was discovered. The “Who killed Mozi?” question remains unanswered. ESET Research found the kill switch, which deactivated the malware and disabled certain functions. The investigation suggests that either the original Mozi … Read more

Milesight Industrial Router Vulnerability Possibly Exploited in Attacks

October 16, 2023 at 08:24AM Chinese IoT and video surveillance product maker Milesight’s industrial cellular routers have a vulnerability that exposes system log files with passwords for administrators and users. Although the flaw has likely been patched for years, there have been some small-scale exploitation attempts observed. These routers are used in various sectors such … Read more