Routers with default passwords are attracting Mirai infections, Juniper says

Avatar

A specific line of Juniper Networks devices can easily become infected with Mirai malware if users don’t scrap their default passwords, the company says in an advisory.

Beginning December 11, customers started reporting “suspicious behavior” on their Session Smart Routers, Juniper says, and they had one thing in common: They were still using the factory-set passwords on the devices.

A variant of Mirai malware was scanning for such routers and, once infected, the devices were “subsequently used as a DDOS attack source” attempting to disrupt websites with junk traffic, Juniper says. The company does not mention how many devices were infected or where the attacks were directed.

As Juniper notes, Mirai is capable of a “a wide range of malicious activities” in addition to its use in DDoS attacks. Previous reports have noted that the malware has spread cryptominers and allowed “click fraud” to inflate the effectiveness of online ads.

Anyone with Session Smart Routers should immediately give them strong, unique passwords and continue to monitor for suspicious network activity such as unusual port scanning, increased login attempts and spikes in outbound internet traffic, Juniper says.

“If a system is found to be infected, the only certain way of stopping the threat is by reimaging the system as it cannot be determined exactly what might have been changed or obtained from the device,” the advisory says.

Connected devices such as routers and cameras make prime targets for Mirai, which often exploits software bugs to spread. Default login credentials make intrusions much easier.

CybercrimeIndustryNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

Thousands Download Malicious npm Libraries Impersonating Legitimate Tools

Next Post

US seeks extradition of alleged LockBit ransomware developer from Israel

Related Posts

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote access trojan (RAT) called DarkVision RAT. The activity, observed by Zscaler ThreatLabz in July 2024, involves a multi-stage process to deliver the RAT payload. "DarkVision RAT communicates with its command-and-control (C2) server using a custom network
Omega Balla
Read More

GITEX ASIA 2025

[[{“value”:” April 23-25, 2025Location: Marina Bay Sands, Singapore GITEX ASIA | 23-25 Apr 2025, Singapore | The Most…
Avatar
Read More