This threat attacks any home device connected to the Internet
The BotenaGo botnet can attack any connected device
We can say that IoT devices are all those devices that we have connected to the Internet in our homes. For example, we talk about smart bulbs, plugs, televisions ... We have seen varieties of malware specifically designed to attack this type of equipment and take full control.
In this case, it is the BotenaGo botnet. It is capable of using 33 different exploits to attack these devices. According to security researchers, millions of computers such as routers, and any other of what is known as the Internet of Things, can be attacked.
The problem is that not many antiviruses detect this threat. In fact, according to the researchers behind this discovery, only six of VirusTotal's 62 antivirus engines were able to detect the threat and some identified it as Mirai, the popular botnet.
They have discovered different types of security flaws that this botnet manages to exploit and thus attack millions of devices. It can, for example, gain remote access or run commands. At the moment, yes, it is in an incomplete operational state. However, the capabilities it has have attracted the attention of researchers.
Fortunately, it has been detected at an early stage and there is already a solution to prevent devices, such as a router, from being affected by this threat and compromising the security of users.
What to do to be protected
The main thing to avoid being a victim of the BotenaGo botnet, as well as any other similar threat, is to always have the latest versions. We must update the devices and thus correct any vulnerability that may exist and be exploited.
Security researchers fear that many devices have not yet been properly updated, either because they do not have patches or because users have not applied them. This is what could put that equipment at risk and significantly affect performance.
It is also essential to always have our network adequately protected. It is essential that the Wi-Fi has good encryption and key that prevents the entry of any intruder. This barrier is very important so that they do not access our network and reach other connected devices.
On the other hand, common sense and avoiding making mistakes will also protect us from problems of this type. It will be essential to only install applications from official sources and avoid accessing links or downloading files that are not reliable and that we receive by email or third-party sites, for example.