Reaper Malware Attacks Infected Millions of Internet Connected Devices

Professional malware software developers do not only target laptops and personal computers because even tablets, mobile and Smartphone users are experiencing unwanted attacks from these types of intruders. Almost all types of electronic devices that access over the Internet. Due to the increasing numbers of reports about cyber attacks that steal personal information from the targeted victims, it is definitely important for us to become aware of this widespread issue and the exact solutions to counter them.

With the development of the Android and IOS operating system units, malware attackers are becoming more interested in threatening the users. One reason is that millions of people from all parts of the world choose to invest for advanced Smartphone devices, than those ordinary items on the market. This is very similar to those who are investing for high-end laptops, PCs and tablets because they want something that feature the newest technological elements.

From the latest reported news online about cyber attacks, there are experts in cyber-security who gave a warning about the possible upcoming cyber hurricane caused by the recent Reaper malware, which infected millions of the devices that connects to the Internet.

The widespread of the infected devices can affect the Internet worldwide.

“Our research suggests we are now experiencing the calm before an even more powerful storm,” said Check Point Software. It added that it has no idea on how the code be employed or the damage extent caused by the attack, as detailed through RT.com on Wednesday.

Reaper malware is also popular as lo Trooper and this is a huge robotic network zombie (also known as Botnet) and it immediately infected millions of Internet Things devices, the reported news added. To mention of these affected devices include video recorders, web-cameras and security surveillance cameras.

From the observation Netlab 360, the malware is expanding or spreading actively and possible queuing millions of IPs from the infected devices through injecting the malicious code from the system.

According from the recorded data of those involved cyber-security experts, the found out about the zombie robotic network in the middle of September this year and originated from the Mirai Botnet source code, which infected websites by using the denial-of-distribution (DDoS) attacks October 2016. As explained by the cyber experts last year, the attacks became the biggest online security invasion in history and successfully took down the Internet within the United States.

The main victim of the Mirai Botnet is the Dyn Company, which has the capacity to control most of the domain name system (DNS) infrastructure of the Internet. The exact date of the attack last year is on October 21, 2016 and became dominant within that day.

It infected websites such as Reddit, the Guardian, Twitter, CNN, Spotify as well as other US and Europe-based online sites. Almost 164 nations worldwide had affected with the Mirai Botnet.

According to Maya Horowitz, Reaper already made an effort to improve the Mirai Botnet and the code is capable of functioning into almost 100 different activities. Unfortunately, the code source is still unidentifiable and can possible continuously infecting more and more electronic devices.

Horowitz is from the Check Point Software and they continue the investigation.

The exact function of Reaper is to exploit the current vulnerabilities in many Internet devices and then inject unknown malicious code. When it succeeded, it will then begin the attack based on the exploited vulnerabilities or weaknesses of the targeted devices.

As expected, the users will not have any idea about the malicious attacks.

In line with this issue, cyber experts from Check Point likewise reported few months ago that about 14 million Android units were infected the CopyCat malware. This particular attack helped the hackers to earn almost $1.5 million within just 60 days through bogus advertisement revenues, as reported through checkpoint.com last July.