The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities. These are designed to increase Mozi’s success rate, and to block attempts to interfere with its compromise of Internet of Things (IoT) devices by exploiting weak passwords and multiple flaws. Since its discovery in 2019, Mozi has been continually upgraded by its operators, demonstrating their intent to dominate a crowded IoT botnet market. Mozi’s exploitation of legacy vulnerabilities in IoT devices highlights the security failures of such products. As device manufacturers struggle to overcome (or bypass) security issues, their reputation dwindles. Even if IoT security improves, cybercriminals will likely adapt and innovate, steadily pursuing their goal of corporate network access by targeting connected devices.
This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media ...
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Main story: Ransom Cartel and REvil: Partners in cybercrime?
Main story: Hacktivists fan flames of Iranian anti-regime protests
Main story: ProxyNotShell spells déjà vu for MS Exchange Server defenders
Main story: Rogue ex-developer leaks LockBit 3.0 builder
Main story: Uber compromised by Lapsus$'s resurgence
Main story: Cyber attacks shock the Italian energy sector
Main story: Back to school for students and ransomware groups
Main story: LastPass suffers source code data breach
Main story: LockBit under DDoS attack: Entrust strikes back?
Main Story: Cisco defies extortion attempts after network breach
Main story: Cybercriminals scramble for new hiding places after 911 proxy service folds
Main story: Free-to-use Redeemer opens doors for ransomware enthusiasts