Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Hauser’s Marks 45 Years With Province-Wide Customer Celebration and Renewed Focus on Community Care
    • Young drivers face elevated collision risks after consuming edible cannabis, new CAA-funded study finds
    • Salvation Army Thrift Store Marks 40th Ontario Location with Peterborough Opening
    • Early Blast of Winter Prompts Safety Warnings from Ontario Road Authorities
    • HONOR Takes Home Two TIME Best Inventions 2025 Awards for Smartphone Breakthroughs
    • Toronto Set to Host Largest LEGO® Fan Event in Canadian History
    • Hank Azaria and Caitlin Morrison Champion Mental Health Through Music at Toronto’s Koerner Hall
    • Bricks in the Six to Build Canada’s Largest-Ever LEGO® Fan Event This November
    Facebook X (Twitter) Instagram YouTube
    Vaughan TodayVaughan Today
    • Home
    • Top News
    • World
    • Banking
    • Explore Canada
    • How to
    • Solutions
    • Contact Form
    Vaughan TodayVaughan Today
    Home»Tech»This malware infects routers and connected objects
    Tech

    This malware infects routers and connected objects

    Jillian CastilloBy Jillian CastilloDecember 6, 2021No Comments2 Mins Read
    This malware infects routers and connected objects
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cyber ​​security researchers fromAT&T Alien Labs They announced that they have identified a new family of malware that attacks routers and
    Connected Objects (Internet of Things). They named it BotenaGo. They point out that it potentially affects millions of devices. To achieve this, it exploits nearly 30 different vulnerabilities.

    AT&T Alien Labs researchers note that BotenaGo has similarities to Mirai robots and is recognized as such by Antivirus. However, they explained that the malware payload was written in Go, an increasingly popular programming language that makes it difficult to detect. In VirusTotal, BotenaGo was detected by only 6 out of 62 antiviruses.

    “Malware developers continue to develop new scripting techniques and enhance the capabilities of the malware,” said Ofer Caspi, security researcher at Alien Labs. “In the case of BotenaGo, it can be managed as a base and used on different operating systems with simple processing.”

    Another notable fact, code analysis revealed that the hackers have a counter, which allows them to see how many devices are infected in real time. Once contaminated, devices can be used to compromise a network or infect new devices.

    Malware is still inactive

    Although millions of devices can be compromised, researchers have found that the malware does not currently connect to any controlled server. The researchers suggest two possibilities to explain this lack of activity. The first is that this is just a beta version that accidentally ended up on the Internet. The second possibility the researchers considered, BotenaGo could be just one unit of a larger group of malware and would be used to target specific devices.

    Regardless of the true origin of the malware, researchers recommend updating all connected objects, in order to reduce the number of vulnerabilities that hackers can use. Finally, Connected Object Network administrators are advised to stay on top of any unusual bandwidth usage.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Jillian Castillo

    "Proud thinker. Tv fanatic. Communicator. Evil student. Food junkie. Passionate coffee geek. Award-winning alcohol advocate."

    Related Posts

    MSI Unveils Black Friday Discounts on Flagship Laptops and Handhelds

    November 1, 2025

    Rare Earth Metals: Essential Uses and the Global Supply Chain

    October 4, 2025

    Bell error 2000: Troubleshoot and Solutions

    June 4, 2023
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.