Torii botnet targets hardware based on x86, x64, MIPS, SuperH and ARM

Another botnet discovered after Mirai. That is the Torii botnet which targets almost every device of today. That is because it covers all hardware architectures. And surely this new botnet is created with super knowledge how the botnet works. Researchers at computer security company Avast have published a report revealing the existence of a new botnet called Torii, whose goal is to attack Internet of Things (IoT) devices and unlike other similar attack programs, it has shown an unprecedented level of complexity.

Torii botnet, Torii botnet targets hardware based on x86, x64, MIPS, SuperH and ARM, Optocrypto

The botnet was first discovered by an independent researcher whose Twitter user is VessOnSecurity, the one who discovered the malware after analyzing his honeypot was spread by an attack from the exit nodes of the Tor network.

Vess also said that Torii’s operation is quite sophisticated, beyond the dreaded Mirai botnet. Avast’s threat analysis showed that the botnet was developed by a hacker with extensive knowledge of how the botnets work, rather than a bolt attack, as previously observed. According to Avast’s report:

Torii has quite extensive capabilities for exfiltrating (sensitive) information, a modular architecture capable of searching for and executing other commands and executable files, and all this across multiple layers of communication.

According to researchers, Torii might have been active since last year, and its targeting capabilities aren’t what you often see in a botnet. In fact, the report says it can compromise hardware architectures based on x86, x64, MIPS, SuperH, ARM and others. In this sense, almost every desktop computer, smartphone, laptop and tablet in use today can be compromised by the botnet.

In terms of the attack itself, the botnet takes advantage of weak passwords on IoT devices to compromise these systems with a shell script that detects or attempts to detect the architecture of the device that it is attempting to attack. Subsequently, it executes the appropriate malware load.

 

Source

Torii botnet, Torii botnet targets hardware based on x86, x64, MIPS, SuperH and ARM, Optocrypto

Meet David, the visionary CEO of Optocrypto, a dynamic leader at the forefront of technological innovation. With an unwavering passion for the ever-evolving world of technology, David is dedicated to unraveling the myriad benefits of the latest advancements. As a seasoned professional, he brings a wealth of expertise to the table, steering Optocrypto toward new heights of success.