Mirai Vulnerability ScannerBETA
Q: What is Mirai malware?
Mirai is malware that compromises Linux devices, turning them into remotely-controlled "zombies" that can be used as part of a distributed denial of service (DDoS) attack.
Mirai primarily targets Internet of Things (IoT) devices, such as routers, DVRS and CCTV cameras. The Mirai botnet has been used in some of the largest known DDoS attacks. This includes the recent takedown of Dyn DNS services, which led to the unavailability of major websites and services to many millions of users in Europe and North America.
Q: The scanner identified a vulnerable device on my network. What can I do?
A device is classified as vulnerable when it can be remotely accessed using one of the passwords in Mirai’s dictionary. To remedy this you should:
- 1. Change your login credentials
- 2. Disable unnecessary remote connection options
- 3. Reboot your device
- 4. Scan your IP again to confirm that the issue was resolved
Q: I restarted my device but the scanner still can't access it. What should I do?
Nothing, you're good. If after rebooting the scanner still can't access your device, it's because the remote access ports are closed and your device is secure from Mirai injection attacks.
Trusted by millions of websites worldwide, Imperva Incapsula is a cloud-based
service that makes websites safer, faster and more reliable.