Satori malware made public

As Checkpoint researchers discovered earlier this week, a variant of Mirai malware dubbed Satori was used to attack hundreds of thousands of Huawei home routers in the past several weeks.

Now the Satori exploit code used in the attack is now public, Threatpost reports. Researchers further warn that the malicious code could quickly be used to launch common DDoS attacks via botnets, such as used in Reaper or IOTrooper. 

Security researcher Ankit Anubhav of NewSky Security identified the code on Monday that was posted publicly on Pastebin.com.

The code is the zero-day vulnerability CVE-2017-17215 used by a hacker named “Nexus Zeta” to spread the Mirai variant.

Leave a Comment

Your email address will not be published. Required fields are marked *