SHARE
Facebook X Pinterest WhatsApp

OMG! New Mirai Variant Turns IoT Devices Into Proxy Servers

thumbnail
OMG! New Mirai Variant Turns IoT Devices Into Proxy Servers

The Mirai variant, dubbed OMG, adds and removes some configurations that can be found in the original botnet’s code.

Written By
thumbnail
Sue Walsh
Sue Walsh
Mar 2, 2018

The Mirai botnet is in the news again with a new variant. Dubbed OMG, it was discovered by researchers at FortiGuard Labs. They found that OMG is capable of turning IoT devices into proxy servers. It removes some of the configurations from the original Mirai code but keeps its modules including the attack and scan module, but turning IoT devices into proxy servers seems to be its primary function. Cybercriminals use them to remain anonymous when carrying out their activities, and they can be monetized by selling them to other criminals. The researchers believe that is what OMG was created for.

OMG’s authors added a firewall rule to allow traffic on the generated ports. This was necessary for the proxy to function as intended. After doing this, the researchers said, it sets up a 3proxy with predefined configurations embedded in its code.

See also: Unsecured IoT devices could lead to “catastrophic” cyberattack, says survey

“This means that it can also do what the original Mirai could, (such as) kill processes related to telnet, ssh, and http by checking open ports and other processes related to other bots, telnet brute-force login to spread and DOS attack,” FortiGuard researchers said in an analysis.

FortiGuard said this is the first time a Mirai variant has been found capable of DDoS attacks but that they feel it’s unlikely it will stand alone for long.

“Since the release of the source code of the Mirai botnet, FortiGuard Labs has seen a number of variations and adaptations written by multiple authors entering the IoT threat landscape,” researchers said. “These modified Mirai-based bots differ by adding new techniques, in addition to the original telnet brute force login, including the use of exploits and the targeting of more architectures. We have also observed that the motivation for many of the modifications to Mirai is to earn more money. Mirai was originally designed for DDoS attack, but later modifications were used to target vulnerable Ethereum mining rigs to mine cryptocurrency.”

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Breaking Free from Invoicing Fraud with Blockchain
Ramon AB
Jun 22, 2023
How to Bridge the Data Chasm and Unlock Digital Transformation
Toby Mills
Apr 17, 2023
How Blockchain is Redefining Supply Chain Management
Distributed Ledger Technology (DLT): The Solution to the Age of Digital Distrust?
Bernd Gross
Oct 12, 2022

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.