From 360a4d4556798ba4cce8ef2ef4215b0726f6467b Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Wed, 9 May 2018 09:29:23 +0200 Subject: [PATCH] add reference for HNS botnet --- clusters/botnet.json | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/clusters/botnet.json b/clusters/botnet.json index 388793f..16c7e5c 100644 --- a/clusters/botnet.json +++ b/clusters/botnet.json @@ -557,7 +557,8 @@ "description": "Security researchers have discovered the first IoT botnet malware strain that can survive device reboots and remain on infected devices after the initial compromise.\nThis is a major game-changing moment in the realm of IoT and router malware. Until today, equipment owners could always remove IoT malware from their smart devices, modems, and routers by resetting the device.\nThe reset operation flushed the device's flash memory, where the device would keep all its working data, including IoT malware strains.\nBut today, Bitdefender researchers announced they found an IoT malware strain that under certain circumstances copies itself to /etc/init.d/, a folder that houses daemon scripts on Linux-based operating systems —like the ones on routers and IoT devices.\nBy placing itself in this menu, the device's OS will automatically start the malware's process after the next reboot.", "meta": { "refs": [ - "https://www.bleepingcomputer.com/news/security/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots/" + "https://www.bleepingcomputer.com/news/security/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots/", + "https://www.bleepingcomputer.com/news/security/new-hns-iot-botnet-has-already-amassed-14k-bots/" ], "synonyms": [ "HNS",