"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots

in #hideandseek7 years ago

"But a new strain of malware, dubbed "Hide n Seek," can live through a power-cycle: it writes a copy of itself to the /etc/init.d/ directory in the IoT device's embedded GNU/Linux system, where startup programs are stored. When a device that's been infected this way is rebooted, it is freshly infected."

https://www.bleepingcomputer.com/news/security/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots/

Coin Marketplace

STEEM 0.24
TRX 0.21
JST 0.037
BTC 98048.48
ETH 3406.24
USDT 1.00
SBD 3.35