EXECUTIVE SUMMARY
EXECUTIVE SUMMARY
Recent threat intelligence indicates significant evolution in Mirai-based botnets, which are now capable of conducting large-scale Distributed Denial-of-Service (DDoS) attacks as well as facilitating proxy-based cybercriminal operations. These botnets primarily target vulnerable Internet of Things (IoT) devices, leveraging weak authentication mechanisms, exposed services, and unpatched vulnerabilities to compromise systems and integrate them into attacker-controlled botnet infrastructure.
Recent variants demonstrate enhanced capabilities beyond traditional volumetric DDoS attacks, including the use of compromised devices as proxy nodes to relay malicious traffic, obscure attacker attribution, and support activities such as credential stuffing, fraud operations, and infrastructure anonymization.
Organizations operating internet-exposed or inadequately secured IoT devices face an elevated risk of compromise, which may result not only in device exploitation but also in indirect involvement in large-scale cyberattacks, potential service disruptions, and reputational impact.
- Malware Family: Mirai Botnet
- Malware Type: IoT Botnet / DDoS Malware
- First Seen: 2016 (actively evolving with multiple variants)
- Current Status: Active Threat
- Primary Objective: DDoS / Proxy infrastructure Abuse
- Target Region: Global
- Targeted Sector: Telecommunications, ISPs, Enterprises, IoT Ecosystems
- Severity: High
- Published Date: 25 March 2026
TECHNICAL DETAILS
- Botnet Evolution: Recent Mirai variants demonstrate enhanced scanning capabilities and expanded exploitation techniques targeting vulnerable IoT devices. These variants actively attempt to compromise devices by abusing weak authentication mechanisms, default credentials, and publicly known vulnerabilities affecting embedded systems and network devices.
- Propagation Mechanism: Mirai propagates by continuously scanning the internet for exposed management services such as Telnet (port 23/2323) and SSH (port 22). Upon identifying accessible targets, the malware attempts credential brute-forcing and……



