{"id":158315,"date":"2023-02-17T06:22:38","date_gmt":"2023-02-17T12:22:38","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/02\/new-mirai-botnet-variant-v3g4-exploiting-13-flaws-to-target-linux-and-iot-devices"},"modified":"2023-02-17T06:22:38","modified_gmt":"2023-02-17T12:22:38","slug":"new-mirai-botnet-variant-v3g4-exploiting-13-flaws-to-target-linux-and-iot-devices","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/02\/new-mirai-botnet-variant-v3g4-exploiting-13-flaws-to-target-linux-and-iot-devices","title":{"rendered":"New Mirai Botnet Variant \u2018V3G4\u2019 Exploiting 13 Flaws to Target Linux and IoT Devices"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-mirai-botnet-variant-v3g4-exploiting-13-flaws-to-target-linux-and-iot-devices.jpg\"><\/a><\/p>\n<p>A new variant of the notorious Mirai botnet has been found leveraging several security vulnerabilities to propagate itself to Linux and IoT devices.<\/p>\n<p>Observed during the second half of 2022, the new version has been dubbed <strong>V3G4<\/strong> by Palo Alto Networks Unit 42, which identified three different campaigns likely conducted by the same threat actor.<\/p>\n<p>\u201cOnce the vulnerable devices are compromised, they will be fully controlled by attackers and become a part of the botnet,\u201d Unit 42 researchers <a href=\"https:\/\/unit42.paloaltonetworks.com\/mirai-variant-v3g4\/#post-126924-_ajb20h1i7fau\" rel=\"noopener\" target=\"_blank\">said<\/a>. \u201cThe threat actor has the capability to utilize those devices to conduct further attacks, such as distributed denial-of-service (DDoS) attacks.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variant of the notorious Mirai botnet has been found leveraging several security vulnerabilities to propagate itself to Linux and IoT devices. Observed during the second half of 2022, the new version has been dubbed V3G4 by Palo Alto Networks Unit 42, which identified three different campaigns likely conducted by the same threat actor. [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-158315","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/158315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=158315"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/158315\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=158315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=158315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=158315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}