Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Kalshi faces state courts over illegal gambling claims

April 21, 2026

North Korean Blamed for $290m KelpDAO Crypto Heist

April 21, 2026

Is Tether’s $1B Ethereum mint early signal for stronger Q2 activity?

April 21, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Default Passwords Aid Satori IoT Botnet Attacks
Default Passwords Aid Satori IoT Botnet Attacks
Security and Privacy

Default Passwords Aid Satori IoT Botnet Attacks

August 25, 2023No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers at Netlab 360 detected a surge in malicious activity scanning and infecting several IoT devices, attempting to make them part of Satori, a variant of the Mirai botnet that is used to take down websites and mine digital coins. Experts point to lack of oversight in IoT and the cursed default usernames and passwords as the reason why hackers are leveraging this critical vulnerability in D-Link DSL routers. 

While Mirai was rampant two years ago, Satori was first discovered in late 2017 infecting more than 260,000 home routers within 12 hours, according to a 15 June post from Netlab 360. Researchers recently noted that the Satori author released a worm, targeting for D-Link DSL-2750B devices. In this latest uptick of malicious activity, this Satori variant has been taking advantage of recently discovered device exploits. It also carries distributed denial-of-service (DDoS) capabilities and has been reported to have launched several DDoS attacks, according to a report from Radware. 

Ashley Stephenson, CEO of Corero Network Security, said, “At this point, Corero detects scans that are indicative of a ‘bot-herding’ phase, seeking devices to compromise as Sartori bots, potentially for multiple botnets owned by different botmasters.”

Consumers using vulnerable routers can take preemptive steps by following the manufacturer’s instructions to disable remote administration, which Corero Network Security said reduces exploit surface. Yet experts want the industry to do more.

Using the two analogies – a car manufacturer no longer issuing recalls and pharmacies continuing to distribute medicines deemed unsafe – Mukul Kumar, CISO and VP of cyber practice at Cavirin, pointed the finger of blame on those who deploy and manage these devices. “The potential for personal and corporate data breach calls for [them] to take additional responsibility, which includes updates.”  

See also  Internet of Things (IoT) in Energy Market Analysis and Forecast to 2033: COVID-19 and Post-COVID Impact, Opportunities and Trends

“We need a more formal update and ‘recall’ mechanism in place,” Kumar continued. “The end user in many cases doesn’t have the skill set or even the awareness to take action. Looking forward to the increasingly connected home – HVAC, security, lighting, etc. – the need for greater oversight is critical.”

In addition to default usernames and passwords, most IoT devices are shipped to consumers and enterprises with out-of-date, unsecure software that is never updated by manufacturers, said Chris Morales, head of security analytics at Vectra. “IoT devices are also trivial to access, with no regulations or guiding principles mandating how secure they should be.” 

Source link

Aid attacks Botnet Default IoT Passwords Satori
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

North Korean Blamed for $290m KelpDAO Crypto Heist

April 21, 2026

Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

April 21, 2026

Ripple’s Schwartz Flags DeFi Bridge Trade-Offs After KelpDAO Incident

April 20, 2026

Layerzero Claims Zero Contagion After $290M Exploit as Disputed Narratives Deepen Scrutiny

April 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

How to Earn Money from Web3 Games: The Ultimate Money-Making Guide

October 8, 2024

Binance Coin (BNB) Shows Resilience Amidst Crypto Market Volatility

October 3, 2023

BTC, ETH pave the way as short positions surge

August 17, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Kalshi faces state courts over illegal gambling claims

April 21, 2026

North Korean Blamed for $290m KelpDAO Crypto Heist

April 21, 2026

Is Tether’s $1B Ethereum mint early signal for stronger Q2 activity?

April 21, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$76,526.001.97%
  • ethereumEthereum(ETH)$2,326.570.97%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.441.87%
  • binancecoinBNB(BNB)$636.581.71%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$85.831.03%
  • tronTRON(TRX)$0.328761-0.23%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.031.33%
  • dogecoinDogecoin(DOGE)$0.0953940.96%