Rise of One More Mirai Worm Variant

ThreatsCybercrime

By embedding two different exploits in its code, it now can propagate itself by scanning for vulnerable devices and then compromising them. Let’s dig into them. As has been stated by other research fellows, the first exploit used by Okiru is linked to the CVE-2014-8361. That vulnerability was disclosed in April 2015.