Iz1h9

Malware updated 22 days ago (2024-11-29T13:58:15.352Z)
Download STIX
Preview STIX
IZ1H9 is a variant of the Mirai botnet, discovered in August 2018 and recognized as one of the most active Mirai variants. This malware targets Internet-of-Things (IoT) networks, exploiting flaws in various products to infect systems. The malware has been involved in multiple campaigns since its discovery, including one that targeted Danish critical infrastructure. IZ1H9 spreads through HTTP, SSH, and Telnet protocols, compromising devices to enlist them into its Distributed Denial of Service (DDoS) swarm, which then launches attacks on specified targets. Unit 42 researchers have observed multiple campaigns using the Mirai IZ1H9 variant since November 2021. The malware exploits several flaws dating from 2015 to 2023, with one campaign targeting an unspecified CVE related to the "/cgi-bin/login.cgi" route, potentially affecting the Prolink PRC2402M router. After exploiting these vulnerabilities, an IZ1H9 payload is injected into the device, containing a command to fetch a shell script downloader named "l.sh" from a specified URL. In September 2023, FortiGuard Labs, the research arm of security firm Fortinet, reported a significant evolution in the IZ1H9 Mirai-based DDoS campaign. The malware added thirteen new payloads to target Linux-based routers and routers from manufacturers such as D-Link, Zyxel, TP-Link, TOTOLINK, among others. The impact of the IZ1H9 Campaign is amplified by the rapid updates to the vulnerabilities it exploits. Once an attacker gains control of a vulnerable device, they can incorporate these newly compromised devices into their botnet, enabling them to launch further attacks like DDoS attacks and brute-force.
Description last updated: 2024-11-25T13:44:28.216Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Mirai is a possible alias for Iz1h9. Mirai is a type of malware that primarily targets Internet of Things (IoT) devices, converting them into a botnet, which is then used to launch Distributed Denial of Service (DDoS) attacks. In early 2022, Mirai botnets accounted for over seven million detections worldwide, though there was a 9% quar
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Botnet
Downloader
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Iz1h9 Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more