News

Malware Analysis Report - Mirai

In today's Malware report, a malware-based attack discovered by analysing log files of a public web server is analysed. 

The attack consists of exploiting a series of known vulnerabilities through command injection performed within a malicious script, which attempts to download and execute a binary file for different CPU architectures. It will then be able to exploit various vulnerabilities of specific devices. 

The main objective of this malware is to compromise Linux systems, especially IoT devices, to create a network of remotely controlled bots called 'zombies'. 

The threat is identified as belonging to the malware family Miraiwhich is known to conduct large-scale DDoS attacks. The malware behaves aggressively, targeting remote management processes such as 'telnet' and 'ssh' to prevent access to the infected machine. It also has the ability to generate random IPv4 addresses to start the propagation phase. 

Despite the fact that the identified Command & Control (C&C) have already been taken offline, this report provides crucial information to understand how the Mirai malware works and helps stakeholders to implement cyber security measures and mitigate potential threats to their network. 

If you wish to learn more, here is the link to our full report.

In addition, you can subscribe to the specific mailing list Cyber Studios by Tinexta Defence, to receive updates on upcoming research: https://tinextadefence.it/mailing-list-cyber-studios/

Share:

Degree in Business Administration from the University of Naples 'Federico II' with an MBA in Business Management achieved with high merit in 2008 by winning a scholarship provided by Invitalia S.p.A. from which she was selected in the first months of attendance as the best MBA profile.

After a brief experience in Invitalia S.p.A., he immediately held increasingly important roles in the management of Administration, Finance and Control of companies operating in the defence sector, theInformation Technology, of Cyber and National Security. In addition, she was Treasury Manager in companies operating in theEnergy.

He obtained an Executive Master in Finance (EMF) at SDA Bocconi in 2020, with a specialisation in Corporate Finance & Control and, in 2022, a further specialisation track in Asset, Wealth Management also at SDA Bocconi.

For over five years it has been the Chief Financial Officer of the Defence Tech Group, whose listing process he followed on the Euronext Growth Milan segment of Borsa Italiana.

From 2017 to 2024, she was a member of the boards of directors of all the legal entity of the Defence Tech Group with delegated powers over their financial management and from October 2021 to October 2024 was a Board Member of the Holding Company.

It is currently also Investor Relations Manager of the listed Defence Tech and follows all ESG issues of the Group.

In July 2021, she was recognised by Federmanager as one of the best talents under 44 at national level, receiving an important award as Young Manager 2020.