Multiple IoT devices targeted

SMART Estate Security 2025 Information Security, Residential Estate (Industry)

Kaspersky Global Research & Analysis Team (GReAT) researchers have found multiple IoT devices targeted with a new version of the Mirai botnet. Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

According to Kaspersky research, there were 1,7 billion attacks on IoT devices (including those made with Mirai) coming from 858 520 devices globally in 2024. 853 393 attacks on IoT devices (including those made with Mirai) were launched from South Africa in 2024, which is almost 3,5 times more than in 2023.

To explore IoT attacks, how such attacks are carried out and how to prevent them, Kaspersky set up so-called honeypots – decoy devices used to attract the attention of the attackers and analyse their activities. In the honeypots, Kaspersky detected the exploitation of the CVE-2024-3721 vulnerability to deploy a bot. It turned out to be a Mirai botnet modification. A botnet is a network of compromised devices infected by malware to perform coordinated malicious activities under the control of an attacker.

This time, the focus of the attacks was digital video recorders (DVRs), which are integral to security and surveillance across multiple sectors. They record footage from cameras to monitor homes, retail stores, offices, warehouses, factories, airports, train stations, and educational institutions, to enhance public safety and secure critical infrastructure. Attacks on DVR devices can compromise privacy, but beyond that, they can serve as entry points for attackers to infiltrate broader networks, spreading malware and creating botnets to launch DDoS attacks, as seen with Mirai.

The discovered DVR bot includes mechanisms to detect and evade virtual machine (VM) environments or emulators commonly used by security researchers to analyse malware. These techniques help the bot avoid detection and analysis, allowing it to operate more stealthily and remain active on infected devices.

“The source code of the Mirai botnet was shared on the Internet nearly a decade ago, and since then, it has been adapted and modified by various cybercriminal groups to create large-scale botnets mostly focused on DDoS and resource hijacking. Exploiting known security flaws in unpatched IoT devices and servers, combined with the widespread use of malware targeting Linux-based systems, results in a significant number of bots constantly searching the Internet for devices to infect. By analysing public sources, we identified over 50 000 exposed DVR devices online, indicating that attackers have numerous opportunities to target unpatched, vulnerable devices,” comments Anderson Leite, security researcher with Kaspersky’s GReAT.

To reduce the risk of IoT device infection, users should:

• Change default credentials and use strong, unique passwords.

• Regularly update DVR firmware to patch known vulnerabilities.

• Disable remote access if unnecessary or use secure VPNs for management.

• Segment DVRs on isolated networks.

• Monitor for unusual network traffic to detect potential compromises.

For more information contact Kaspersky SA, +27 11 783 2424, info@kaspersky.com, www.kaspersky.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
Risks of fire safety in residential environments
Fire & Safety Residential Estate (Industry)
ASP Fire is highlighting the significant fire risks in residential environments and stressing the importance of proactive fire-safety management at the household level.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.