A new version of the Miori botnet added protection to the login panel of its command and control server, hanging a “not welcome”” message for connections. The new variant has support for encrypted commands and is allowed to connect to the command server only after sending the specific string. The malware is an offshoot of Mirai and has been referenced since at least late May last year. It targets IoT devices that have SSH and Telnet services exposed to the web and are secured with poor access credentials.”
Source: https://www.bleepingcomputer.com/news/security/updated-miori-botnet-c2-server-tells-researchers-to-f-off/

