Satori Adds Known Exploit Chain to Enslave Wireless IP Cameras

February 2, 2018

Satori, a Mirai based IoT bot, has been one of the most actively updated exploits in recent months. It is believed that the hacker behind this bot is also the author of other Mirai variants, known as Okiru, and Masuta. FortiGuard Labs researchers recently observed a new Satori version that had added a known exploit chain (one which had been used in the past by the Persirai bot) to enable it to spread to vulnerable devices, particularly, wireless IP cameras that run a vulnerable custom version of the GoAhead web server.

Read more...

Previous Article
Security Against the Invisible Enemy -- Preparing for the Mandatory Notifiable Data Breach Scheme Part 2
Security Against the Invisible Enemy -- Preparing for the Mandatory Notifiable Data Breach Scheme Part 2

In our last blog we learnt what potential impact the mandatory breach notification and the EU’s GDPR will h...

Next Article
The Risks of Shadow IT at Financial Services Firms
The Risks of Shadow IT at Financial Services Firms

The use of Shadow IT is increasing thanks to SaaS. Learn the risks that shadow IT poses to financial servic...