“D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it,” the companywarnedin September.The hackers have been observed targeting TP-Link and ZTE router vulnerabilities as well, Akamai says.The threat actor behind the recently observed attacks appears not to have used vibe coding to build their payload.“Mirai malware campaigns continue to plague the industry, with much of the original source code continuing to be reused by various threat actors, both skilled and unskilled. The low barrier of entry and potential financial benefits are some of the incentives that may entice individuals to enter the botnet space and become a cyberthreat actor,” Akamai notes.Related:Evasive Masjesu DDoS Botnet Targets IoT DevicesRelated:Aisuru and Kimwolf DDoS Botnets Disrupted in International OperationRelated:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

The hackers have been observed targeting TP-Link and ZTE router vulnerabilities as well, Akamai says.The threat actor behind the recently observed attacks appears not to have used vibe coding to build their payload.“Mirai malware campaigns continue to plague the industry, with much of the original source code continuing to be reused by various threat actors, both skilled and unskilled. The low barrier of entry and potential financial benefits are some of the incentives that may entice individuals to enter the botnet space and become a cyberthreat actor,” Akamai notes.Related:Evasive Masjesu DDoS Botnet Targets IoT DevicesRelated:Aisuru and Kimwolf DDoS Botnets Disrupted in International OperationRelated:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

The threat actor behind the recently observed attacks appears not to have used vibe coding to build their payload.“Mirai malware campaigns continue to plague the industry, with much of the original source code continuing to be reused by various threat actors, both skilled and unskilled. The low barrier of entry and potential financial benefits are some of the incentives that may entice individuals to enter the botnet space and become a cyberthreat actor,” Akamai notes.Related:Evasive Masjesu DDoS Botnet Targets IoT DevicesRelated:Aisuru and Kimwolf DDoS Botnets Disrupted in International OperationRelated:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

“Mirai malware campaigns continue to plague the industry, with much of the original source code continuing to be reused by various threat actors, both skilled and unskilled. The low barrier of entry and potential financial benefits are some of the incentives that may entice individuals to enter the botnet space and become a cyberthreat actor,” Akamai notes.Related:Evasive Masjesu DDoS Botnet Targets IoT DevicesRelated:Aisuru and Kimwolf DDoS Botnets Disrupted in International OperationRelated:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Related:Evasive Masjesu DDoS Botnet Targets IoT DevicesRelated:Aisuru and Kimwolf DDoS Botnets Disrupted in International OperationRelated:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Related:Aisuru and Kimwolf DDoS Botnets Disrupted in International OperationRelated:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Related:174 Vulnerabilities Targeted by RondoDox BotnetRelated:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Related:Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Ionut Arghire is an international correspondent for SecurityWeek.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Source: SecurityWeek