Smart Home

2019/08/14

Back-to-Back Campaigns: Neko, Mirai, and Bashlite Malware Variants Use Various Exploits to Target Several Routers, Devices

Back-to-Back Campaigns: Neko, Mirai, and Bashlite Malware Variants Use Various Exploits to Target Several Routers, Devices

Within a span of three weeks, our telemetry uncovered three notable malware variants of Neko, Mirai, and Bashlite. On July 22, 2019, we saw and started analyzing a Neko botnet sample, then observed another sample with additional exploits the following week.

2019/08/12

Mirai Spawn Echobot Found Using Over 50 Different Exploits

Mirai Spawn Echobot Found Using Over 50 Different Exploits

Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.

2019/08/05

Keeping a Hidden Identity: Mirai C&Cs in Tor Network

Keeping a Hidden Identity: Mirai C&Cs in Tor Network

With its notoriety for being one of the most active internet of things (IoT) malware families, Mirai is one malware family system administrators consistently keep their eye on to make sure systems and devices are protected.

2019/07/31

Inside the Smart Home: IoT Device Threats and Attack Scenarios

Inside the Smart Home: IoT Device Threats and Attack Scenarios

A smart home is made up of a number of different devices connected to the internet of things (IoT), each with a specific set of functions. No matter how different these devices are from one another, they have the shared goal of streamlining the tasks and simplifying the lives of their users.

2019/05/23

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

We discovered a new variant of Mirai (detected as Backdoor.Linux.MIRAI.VWIPT) that uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks.

2019/05/22

Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate.

2019/05/08

Are Your Devices at Risk? Find out with HouseCall for Home Networks

Are Your Devices at Risk? Find out with HouseCall for Home Networks

HouseCall for Home Networks is a free and easy-to-use Trend Micro solution that scans your Wi-Fi connected devices and checks them for security risks to protect you from hackers, privacy leaks, and other threats.

2019/04/18

Is Your Baby Monitor Susceptible to Hacking?

Is Your Baby Monitor Susceptible to Hacking?

In a number of high-profile cases, home surveillance cameras have been easily compromised and disturbing reports of hacked baby monitors are in the news.

2019/04/15

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro Announces Partnership Enhancement, Showcases Solutions and Technologies for IoT Security at Hannover Messe 2019

Trend Micro participated in the 2019 edition of Hannover Messe, which, with more than 6,000 exhibiting companies and over 200,000 visitors every year, is the world’s leading trade show for industrial technology.

2019/04/10

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

Bashlite IoT Malware Updated with Mining and Backdoor Commands, Targets WeMo Devices

We uncovered an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet. Based on the Metasploit module it exploits, the malware targets devices with the WeMo Universal Plug and Play (UPnP) application programming interface (API).

2019/04/09

Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers

Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers

Trend Micro researchers uncovered a new variant of the notorious Mirai malware that uses multiple exploits to target various routers and internet-of-things devices.

2019/03/22

New Mirai Botnet Variant Targets IoT TV, Presentation Systems

New Mirai Botnet Variant Targets IoT TV, Presentation Systems

A new Mirai botnet variant is targeting smart signage TV and wireless presentation systems commonly used by businesses. Upgraded with 11 new exploits and default credentials for brute-forcing, enterprises are advised to patch immediately.

2019/03/11

UPnP-enabled Connected Devices in the Home and Unpatched Known Vulnerabilities

UPnP-enabled Connected Devices in the Home and Unpatched Known Vulnerabilities

Many devices such as cameras, printers, and routers use UPnP to make it easy for them to automatically discover and vet other devices on a local network and communicate with each other for data sharing or media streaming. UPnP works with network protocols to configure communications in the network. But with its convenience comes security holes that range from attackers gaining control of devices to bypassing firewall protections.

2019/03/06

Securing Smart Homes and Buildings: Threats and Risks to Complex IoT Environments

Securing Smart Homes and Buildings: Threats and Risks to Complex IoT Environments

The evolution of smart homes and smart buildings into complex IoT environments reflects the continuing developments in home and industrial automation. Security should not be left behind as increased complexity also means new threats and risks.

2018/12/17

New Exploit Kit “Novidade” Found Targeting Home and SOHO Routers

New Exploit Kit “Novidade” Found Targeting Home and SOHO Routers

We identified a new exploit kit we named Novidade that targets home or small office routers by changing their Domain Name System (DNS) settings via cross-site request forgery (CSRF), enabling attacks on a victim’s mobile device or desktop ...

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop