Mirai - Daily Threat Report

Tuesday, April 21, 2026

Daily Summary

Today’s detection of 100 new Mirai samples represents a significant surge from a 7-day average of zero, indicating a new campaign or the reactivation of a dormant botnet. The trend is marked as stable due to the lack of prior baseline, but the volume itself is a notable event. The absence of new C2 servers suggests this activity may be leveraging existing infrastructure.

New Samples Detected

The new samples show a strong focus on IoT and embedded systems, with ELF executables making up 25% of the total. The distribution across numerous CPU architectures - including MIPS, ARM variants, PPC, and x86 - confirms the malware’s ongoing targeting of a broad spectrum of devices, from routers and cameras to potentially industrial control systems. No significant shifts in packaging or naming conventions are immediately apparent in this batch.

Distribution Methods

Based on the file types, distribution remains consistent with Mirai’s historical pattern of brute-force attacks against IoT devices with weak or default Telnet and SSH credentials. The lack of document or script files indicates this campaign is not using phishing or web-based delivery, but is instead directly targeting vulnerable networked devices through automated scanning and exploitation.

Detection Rate

Current variants in this surge are likely well-detected by major antivirus engines, given Mirai’s established signatures. However, the continuous compilation for diverse architectures suggests ongoing attempts to find unprotected device models. The static detection rate for these specific binaries is high, but the initial compromise vector (credential brute-forcing) often occurs below the AV threshold on the target devices themselves.

C2 Infrastructure

No new C2 servers were identified today alongside this sample surge. This points to the new binaries being compiled to connect to established, resilient command-and-control infrastructure, possibly using domain generation algorithms (DGAs) or hardcoded IP addresses from previous campaigns. Geographic patterns cannot be determined without active C2 data.

7-Day Trend

Following a week of no recorded activity, today’s spike breaks a period of dormancy. This pattern is consistent with Mirai’s operational model, where botnet herders may compile and deploy new binaries in bursts to replenish or expand their compromised device networks.

Security Analysis

A non-obvious observation is the continued inclusion of the .i686 architecture, which targets older Intel-based systems. This suggests actors are not solely focused on modern ARM-based IoT devices but are also opportunistically sweeping for legacy embedded systems and network hardware that may be overlooked in patch cycles. Compared to earlier campaigns, the architectural spread remains comprehensive, indicating a “maximization” tactic to infect any vulnerable system regardless of its CPU.

Actionable Recommendation: Defenders should prioritize network-level controls over reliance on endpoint detection for IoT. Implement strict firewall rules to block inbound Telnet (port 23) and SSH (port 22) connections from the internet to all IoT and embedded devices. Additionally, enforce network segmentation to isolate these devices from critical internal networks, limiting lateral movement potential.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More Mirai Reports

Recent Malware Reports