Mirai - Daily Threat Report

Friday, May 1, 2026

Daily Summary

Mirai activity saw 100 new samples, significantly above the 7-day average of 71 and marking a 40% surge. This spike indicates a renewed campaign push, likely testing new variants across diverse IoT architectures.

New Samples Detected

The sample set spans 10 distinct architectures, with .elf files leading at 22, followed by .x86, .mips, and .ppc at 9 and 7 each. Other architectures like .m68k, .sh4, .arm7, and .spc each contribute 5 samples, illustrating the botnet’s broad targeting strategy. No unusual naming patterns were observed; the samples appear to use standard compilation labels.

Distribution Methods

File types indicate delivery via direct binary downloads, likely from compromised devices or unprotected IoT ports. The presence of multiple low-power architectures (.m68k, .sh4) suggests scanning for legacy or embedded systems, such as routers and camera hardware. Distribution likely relies on automated brute-forcing of default credentials.

Detection Rate

Detection rates remain moderate, with many AV engines flagging known hashes but newer variants occasionally slipping through. The diverse architecture set may delay signature updates for minor architectures, allowing some evasive samples to persist longer.

C2 Infrastructure

No new C2 servers were detected today, suggesting the existing infrastructure remains operational. Without geographic data for the samples, C2 activity likely continues to leverage distributed IPs in cloud or bulletproof hosting regions.

7-Day Trend

The surge to 100 from a 71 average signals an escalating campaign after a relatively steady week. This above-trend activity suggests operators are actively testing or expanding their scope.

Security Analysis

A notable observation is the zero C2 addition despite the sample spike. This may indicate the reuse of previously undetected or resilient C2 infrastructure, or that today’s samples are part of a data-gathering phase before a larger C2 setup. Defensively, focus on network segmentation and applying strict egress filters to known Mirai C2 IPs to limit command execution. Audit IoT devices for default credential changes and unused port closures.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More Mirai Reports

Recent Malware Reports