Alias Description | Votes |
---|---|
Mozi Botnet is a possible alias for Mozi. The Mozi botnet, a notorious malware, was responsible for 74% of all Internet of Things (IoT) attacks in 2021. Despite the arrest of its authors in summer 2021 leading to an overall drop in IoT attacks in Q4 of that year, the malware continued to infect more connected devices. It saw significant gro | 5 |
Alias Description | Association Type | Votes |
---|---|---|
The Mirai Malware is associated with Mozi. Mirai is a type of malware that primarily targets Internet of Things (IoT) devices, converting them into a botnet, which is then used to launch Distributed Denial of Service (DDoS) attacks. In early 2022, Mirai botnets accounted for over seven million detections worldwide, though there was a 9% quar | Unspecified | 5 |
The Kinsing Malware is associated with Mozi. Kinsing is a malicious software, or malware, that has been recently observed exploiting vulnerabilities in systems. It operates by infiltrating computers or devices, often undetected, through suspicious downloads, emails, or websites. Once inside, Kinsing can wreak havoc by stealing personal informa | Unspecified | 2 |
The Magecart Malware is associated with Mozi. Magecart is a form of malware that targets e-commerce platforms by injecting malicious code to steal customer data. The malware can infect systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can disrupt operations and steal personal informat | Unspecified | 2 |
The Lumma Stealer Malware is associated with Mozi. Lumma Stealer is a potent malware designed to exfiltrate information from compromised systems, including system details, web browsers, and browser extensions. The malware was primarily delivered to victims through websites hosting cracked games, specifically targeting gamers. In July 2024, it was di | Unspecified | 2 |
The Gafgyt Malware is associated with Mozi. Gafgyt, also known as Bashlite, is a type of malware that targets Linux architecture operating systems with the primary intent to launch distributed denial of service (DDoS) attacks. This malicious software infiltrates systems often through suspicious downloads, emails, or websites, and upon entry, | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
InfoSecurity-magazine | 2 months ago | ||
ESET | 4 months ago | ||
Securityaffairs | 9 months ago | ||
Securityaffairs | 9 months ago | ||
Securityaffairs | 9 months ago | ||
Securityaffairs | 9 months ago | ||
Securityaffairs | 10 months ago | ||
Securityaffairs | 10 months ago | ||
Securityaffairs | 10 months ago | ||
CERT-EU | 10 months ago | ||
Securityaffairs | 10 months ago | ||
Securityaffairs | a year ago | ||
ESET | a year ago | ||
Securityaffairs | a year ago | ||
Securityaffairs | a year ago | ||
CERT-EU | a year ago | ||
Securityaffairs | a year ago | ||
Securityaffairs | a year ago | ||
CERT-EU | a year ago | ||
Securityaffairs | a year ago |