Overview

Mirai is a botnet malware variant that compromises smart devices that operate on ARC processors, the aim of which is to formulate a network of bot machines to carry out distributed denial-of service (DDoS) attacks1. Mirai scans the internet for Internet of Things (IoT) devices that operate on the ARC processor. The malware has the capabilities of establishing a foothold on target systems if the username and password combination has not been reconfigured. Mirai initially infected and weaponised devices such as smart cameras and Realtek routers.

The botnet variant was created in a racketeering attempt by the cofounders of Protraf Solutions, an organisation offering DDoS mitigation services. The creators of Mirai originally leased out the Mirai Botnet variant for the implementation of DDoS attacks, as well as ‘click fraud’ attacks. The source code of Mirai was subsequently released into the wild, since when the code has constantly mutated and, as such, has led to the formation of more advanced botnet strains, such as: Okiru, Satori, Masuta and PureMasuta. These variants operate across the botnet model spectrum, namely those of: centralised botnets, tiered C&Cs and decentralised botnets.

In April 2023, the Mirari Botnet malware was detected to be actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability.

Impact

The Mirai Botnet malware is particularly dangerous due to their abilities to implement DDoS attacks, which can prove difficult to remediate. Furthermore, IoT botnets have been documented to have implemented the following additional infection vectors on target systems:

• Denial-of-Service to legitimate traffic of Internet Service Providers
• Sending of spam email
• Launching of DDoS attacks to compromise websites and APIs
• Performance of click fraud attacks
• Disabling anti-virus software
• Solving weak CAPTCHA challenges on websites in order to imitate human behaviour during logins
• Theft of credit card information
• Hold companies to ransom with threats of DDoS attacks.

Download this report

Further Malware Reports from Quorum Cyber

Headquarters

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

Colorado, USA Office

950 S Cherry St Ste 505
Denver, Colorado
USA
80246

Dubai, UAE Office

Meydan Grandstand
6th floor
Meydan Road
Nad AI Sheba
Dubai, U.A.E

Colorado, USA Office

950 S Cherry St Ste 505
Denver, Colorado
USA
80246

Ontario, Canada Office

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

Arizona, USA Office

1300 S Litchfield Rd
110-L, Goodyear
USA
Arizona 85338

Contact Us
Address

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

950 S Cherry St Ste 505
Denver, Colorado
USA
80246

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

HEADQUARTERS
Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ



COLORADO, USA OFFICE
950 S Cherry St Ste 505
Denver, Colorado
USA
80246


ONTARIO, CANADA OFFICE
1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7


Legal

Privacy Preference Center

Skip to content