A new Variant called OMGs is evolving to abuse the IoT Devices and turns it into a Proxy server by adding new techniques that will be later used for various Malicious activities. Researchers analysis the configuration table of the OMG server and reveal that, OMG table of completely encrypted and using 0xdeadbeef as cipher key seed, decryption can be possible and this was the same method used by Mirai Botnet. The name Mirai was given to the Mirai bot because of the strings /bin/busybox MIRAI: applet not found, which are commands to determine if it has successfully brute-forced its way into the targeted IoT device.”]
Source: https://gbhackers.com/iot-device-into-a-proxy-server/

