mgibson Blog Banner

mgibson

‘OMG’ – a different kind of Mirai IoT bot malware that mine cryptocurrency by converting IoT Devices into Proxy Servers

https://steemitimages.com/DQmSL3PmeogbTn6ksSXuPxmiV71rEPSkVq85oJNsnSAZPeq/mirai.jpg

Image credit


Hackers or cybercriminals are working hard to mine cryptocurrency by hijacking other’s devices. I don’t know whether I should appreciate them or not. They are using their mind for negative work. ‘OMG’ is a different type of Mirai IoT bot malware that helps to convert IoT devices into Proxy Servers so that they can mine cryptocurrency. This malicious code is written by ex-student at Rutgers University and initiated in September 2016. Now it is being rebuilt again to make it more efficient bot malware. 

‘OMG’ is a new version of Mirai bot, which can not only run DDoS attack but also turn IoT devices into proxy servers. The cyber attackers can easily mine cryptocurrency by using converted proxy servers, which functions just like Satori IoT malware created in December 2017.

A research team at FortiGuard Labs described these things in their official blog post

“With this development, we believe that more and more Mirai-based bots are going to emerge with new ways of monetization.”

Read more here: https://www.hackread.com/mirai-variant-omg-turns-iot-devices-into-proxy-servers-cryptomining/

Follow me



Return from to mgibson's Web3 Blog

‘OMG’ – a different kind of Mirai IoT bot malware that mine cryptocurrency by converting IoT Devices into Proxy Servers was published on and last updated on 28 Feb 2018.