{"id":43109,"date":"2017-11-20T16:11:24","date_gmt":"2017-11-20T21:11:24","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=43109"},"modified":"2020-08-11T14:04:04","modified_gmt":"2020-08-11T19:04:04","slug":"latest-threat-reaper","status":"publish","type":"post","link":"https:\/\/www.een.com\/nl\/blog\/latest-threat-reaper\/","title":{"rendered":"Latest Threat: Reaper"},"content":{"rendered":"<p>Last year Mirai malware hit 500,000 IoT devices and launched DDoS attacks. Now, a new malware has been identified by researchers at CheckPoint that is surpassing Mirai by hitting millions of IoT devices worldwide.<\/p>\n<p>On October 19, 2017, Checkpoint, announced that they&#8217;ve been tracking a &#8220;massive&#8221; IoT botnet &#8220;forming to create a cyber-storm that could take down the Internet.&#8221; Checkpoint stated that this malware has already infected ~one million organizations, and is impacting IoT devices at a much faster pace than Mirai.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-43120 aligncenter\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper.png\" alt=\"trendofattackingips-reaper\" width=\"645\" height=\"353\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper.png 645w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper-300x164.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper-100x55.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper-200x109.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper-400x219.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/11\/trendofattackingips-reaper-600x328.png 600w\" sizes=\"(max-width: 645px) 100vw, 645px\" \/><\/p>\n<p><em>This graphic from CheckPoint charts a steep, recent rise in the number of Internet addresses trying to spread the new IoT malware variant, which CheckPoint calls \u201cIoTroop.\u201d<\/em><\/p>\n<p>On October 20, 2017, Netlab 360 confirmed the existence of the new strain, and named it &#8216;Reaper.&#8217; Netlab 360 also stated that the malware is\u00a0 spreading much more quickly and deliberately than Mirai.<\/p>\n<p>Unlike Mirai, which wriggles into vulnerable IoT devices using factory-default or hard-coded usernames and passwords, this newest malware leverages known security vulnerabilities across nearly a dozen different device makers. The malware is attacking a majority of devices manufactured by Linksys, D-Link, TP-Link, Netgear, Synology, Avtech, MikroTik and GoAhead. Some of these manufacturers have released patches to fix the vulnerabilities in their devices.<\/p>\n<p>Reaper isn&#8217;t attacking anyone yet, but it is out there&#8230;waiting.<\/p>\n<p>Now more than ever, it&#8217;s important to work with companies who ensure cyber security.<\/p>\n<p>Read More Cyber Security Blog Posts<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last year Mirai malware hit 500,000 IoT devices and launched DDoS attacks. Now, a new malware has been identified by researchers at CheckPoint that is surpassing Mirai by hitting millions &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/nl\/blog\/latest-threat-reaper\/\"> <span class=\"screen-reader-text\">Latest Threat: Reaper<\/span> Lees verder &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":43113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-43109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts\/43109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/comments?post=43109"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts\/43109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/media\/43113"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/media?parent=43109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/categories?post=43109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/tags?post=43109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}