SHARE
Facebook X Pinterest WhatsApp

The Reaper May Come to Haunt IoT Devices

Experts are warning about the emergence of a powerful IoT botnet dubbed Reaper.

Written By
thumbnail
Sue Walsh
Sue Walsh
Oct 25, 2017

Grim reaper/ angel of death with lamp at nightIf you thought Mirai was bad, you’re really going to fear the Reaper. That’s the word from security experts at Check Point Researchers who have discovered a new IoT botnet.

The botnet, which has been named IoTroop (by Check Point) or Reaper, (by Netlab 360) is growing and infecting IoT devices at a much faster pace than the infamous Mirai botnet credited with taking down half the internet.

[ Related: IoT Technologies: Developers Prefer Java, Worry About Security ]

The new IoT botnet was first discovered at the end of September. Unlike Mirai, which infected IoT devices using default or hard-coded user names and passwords, it evolves daily to exploit a variety of vulnerabilities in IoT-connected cameras made by GoAhead, D-Link, TP-Link, AVTECH, NETGEAR, MikroTik, Linksys, Synology and others. The attacks were found to be coming from other IoT devices.  Check Point estimates at least 1 million organizations have been infected.

Taking down the Internet with an IoT botnet 

While some technical aspects lead us to suspect a possible connection to Mirai, this is an entirely new and far more sophisticated campaign that is rapidly spreading worldwide. It is too early to guess the intentions of the threat actors behind it, but with previous Botnet DDoS attacks essentially taking down the Internet, it is vital that organizations make proper preparations and defense mechanisms are put in place before an attack strikes.” Checkpoint said in a blog post.

Security firm Netlab 360 said it is tracking multiple command and control servers (C2) for the IoT botnet and are finding over 10,000 unique and active bot IP addresses a day. The firm said there are also millions of device IPs being queued into the command and control system to be “processed” that is, infected with the malicious code that will add the devices to the bot net.

[ Related: Best Practices for IoT Security: Expert Spotlight ]

According to a post on their website, Netlab 360 says that it has so far determined the following:

  • Number of vulnerable devices in one c2 queue waiting to be infected: over 2 million.
  • Infected bots controlled by one C2 in last 7seven days: over 20,000.
  • Number of daily active bots controlled by one C2: around 10k for one day (October 19).
  • Number of simultaneous online bots controlled by one C2: around 4,000.

“Currently, this botnet is still in its early stages of expansion. But the author is actively modifying the code, which deserves our vigilance,” said the firm.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

When AI Writes the Code, Security Must Manage the Risks
Paolo Del Mundo
Feb 18, 2026
How Can AI Improve Industrial Inventory Management (Practical Use Cases)
Luke Crihfield
Feb 17, 2026
Why Intelligence Without Authority Cannot Deliver Enterprise Value
Harsha Kumar
Feb 17, 2026
Real-time Analytics News for the Week Ending February 14
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.