The Resurgence of IoT Malware: Inside the Mirai-Based Botnet Campaign www.fortinet.com/blog/thre…
Over the past year, FortiGuard Labs has been tracking a stealthy malware strain exploiting a range of vulnerabilities to infiltrate systems. Initially disclosed by a Chinese cybersecurity firm under the name “Gayfemboy.” The malware resurfaced this past July with new activity, this time targeting vulnerabilities in products from vendors such as DrayTek, TP-Link, Raisecom, and Cisco, and exhibiting signs of evolution in both form and behavior.
This article presents an in-depth analysis of the malware, revealing its technical details and exploring the implications of its evolving behavior.