New Mirai-Based Campaign Targets unpatched TOTOLINK Routers. By leveraging a newly released exploit code, threat actors can potentially infect vulnerable devices. The campaign, dubbed Beastmode, was observed updating its arsenal by adding five more exploits, three of which were targeting various vulnerable models. The latest campaign derives its name from filenames and URLs used for its binary samples, as well as a unique HTTP User-Agent header “b3astmode” within the exploit requests.”]
Source: https://www.cuinfosecurity.com/new-mirai-based-campaign-targets-unpatched-totolink-routers-a-18840

