IoC Extractor

This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.

Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]

DATE : 2023-12-26T07:00:00
SOURCE : sans.edu

FILE_HASH_SHA256:
b023af46798a045ce9606318928ed9a96bd64bc25c7279a08b5fee38176e5dc9

Domain:
cisecurity.org
securityweek.com
stratosphereips.org
sciencedirect.com
cyfirma.com
inc.my

Url:
https://www.cisecurity.org/insights/blog/the-mirai-botnet-threats-and-mitigations::text=IoT%20devices%20built%20for%20convenience
https://www.securityweek.com/mirai-variant-v3g4-targets-13-vulnerabilities-to-infect-iot-devices/::text=During%20the%20second%20half%20of
https://www.stratosphereips.org/datasets-iot23
https://www.sciencedirect.com/science/article/pii/S2666281720300214
https://www.cyfirma.com/blogs/mirai-the-botnet-that-made-iot-dangerous/?sfw=pass1701218240