Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
A new botnet named BotenaGo has been seen in the wild targeting a number of IoT devices and routers. AT&T’s Alien Labs published a report about the recently discovered malware and stated that it can exploit up to 30 different vulnerabilities against its targets. BotenaGo is written in the open-source programming language Golang - a programming language designed by Google with networking in mind.
Researchers are not sure who is behind the exploit, but the malware-scanning tool, Shodan, showed that BotenaGo could be a modified version of a malware botnet called Mirai. Mirai was last used in 2016 to carry out DDoS attacks. Despite the malware scan, AT&T Alien Labs doesn’t believe that Mirai and BotenaGo are one in the same. The two malware don’t have the same attack functions, but it’s possible that they were designed to work together.
BotenaGo is capable of creating botnets that function across a variety of device types, gaining access to networks and allowing hackers to carry out DDoS attacks. Additionally, the malware creates a backdoor and waits to receive a target to attack through port 19412 or from another related module running on the same machine The Botnet exploits devices with flaws related to the following CVEs:
Although BotenaGo is still in the beta phase and has been accidentally leaked, any botnet with this kind of potential is particularly concerning for the health care industry and other industries. Researchers are not sure how many devices BotenaGo has infected or how widespread the malware has become. Considering hospitals and other medical facilities run their daily operations using IoT devices, it’s always a good idea to be vigilant with addressing exploits like BotenaGo before they get a chance to infect systems and devices.
BotenaGo botnet targets millions of IoT devices with 33 exploits (bleepingcomputer.com)
AT&T Reveals Malware Targeting Millions of Routers, IoT Devices | PCMag