It comes as no surprise that IoT botnets are becoming problematic, and the situation will only worsen. As soon as the Mirai source code was posted online back in late 2016, attackers were making custom modifications to it in order to meet their required objectives.
I’ll be presenting on “Breaking into Embedded Devices and IoT Security” at BSides London 2018 next week, 6 June, 15:15-16:00, talking about Mirai, as well as some other IoT attack examples. Further details can be found here: https://securitybsideslondon2018.sched.com/event/EpUH
Cybercrooks are using the infamous Mirai IoT botnet as a framework to quickly add in new exploits and functionalities, it has emerged. The tactic is dramatically decreasing the development time for new botnets, according to research from Netscout's Arbor Security Engineering and Response Team (ASERT). Botnet authors are already using the Mirai source code as their building blocks. "As the explosion of IoT devices does not look to be slowing down, it is likely we'll continue to see increases in IoT botnets," ASERT warns. "We are likely to see remnants of Mirai live on in these new botnets as well."