Mirai DDOS Source Code


Mirai DDoS Malware Source Code Leaked


So there’s been some HUGE DDoS attacks going on lately, up to 620Gbps and the Mirai DDoS Malware has been fingered – with the source code also being leaked.
It’s spreading like wildfire too, and the scariest thought? All that was really needed to construct it was a telnet scanner and a list of default credentials for IoT devices (not even a long list, just 36).
Malicious code used to press-gang IoT connected devices into a botnet was leaked online over the weekend.
The Mirai malware is a DDoS Trojan and targets Linux systems and, in particular, IoT devices. A botnet formed using the malware was used to blast junk traffic at the website of security researcher Brian Krebs last month in one of the largest such attacks ever recorded.
The powerful zombie network that spawned a 620Gbps DDoS was created by relying on factory default or hard-coded usernames and passwords to compromise embedded devices. The availability of the Mirai source code makes it much easier for other hackers to take advantage of insecure routers, IP cameras, digital video recorders and other IoT devices to launch similar attacks.
Security blogger Hacker Fantastic, who has put together an informative early analysis of the malware, summed up the feelings of several security researchers who have looked at the code. “If all it took to create biggest recorded DDoS attack in history was a telnet scanner and 36 weak credentials the net has a huge IoT problem,” he said on Twitter.
Stephen Gates, chief research intelligence analyst at NSFOCUS, argued that the problem of consumer kit with default passwords needs to be resolved sooner rather than later or else more and perhaps more widespread attacks along the same lines will become inevitable.

Download :   Mirai Source Code - Alternatif Link