Mirai, seen as revolutionary for malware that targets the Internet of Things (IoT), has wrought destruction around the globe and popularized IoT based malware. Mirai was utilized by attackers to launch multiple high-profile, high-impact DDoS attacks against various Internet properties and services in 2016. Since the release of Mirai’s source code, IoT botnet authors have used it as a framework to build new malware. Authors have expanded the original Mirai code base with new capabilities and functionality while making some improvements. This talk will cover three of the most recent variants of Mirai based botnets and the flair added by the authors to make it their own.
Peter Arzamendi is a Security Researcher with NETSCOUT Arbor's ASERT team. He has expertise in vulnerability discovery, fuzzing, exploitation techniques, malware analysis, and protocol analysis. Areas of interest include static and dynamic analysis of binaries and hardware reverse engineering. He has over 15 years of experience in systems administration, computer engineering, and information systems security. He is active in the InfoSec community and has presented on security topics at Shmoocon, Hack in Paris, Blackhat Arsenal, and local venues. He has also contributed to several open source projects such as Metasploit, Fgdump, and Serpico.