{"id":26189,"date":"2019-03-18T17:22:38","date_gmt":"2019-03-18T17:22:38","guid":{"rendered":"http:\/\/2d074553-5c6c-4fc5-8670-81a2482001d5"},"modified":"2019-03-18T17:22:38","modified_gmt":"2019-03-18T17:22:38","slug":"new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/","title":{"rendered":"New Mirai malware variant targets signage TVs and presentation systems"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2018\/09\/19\/66187e62-8666-457f-8904-4364f728ab82\/1a3edffdc56f9ad366d0b5c0b33d8fd1\/mirai.png\" class alt=\"mirai.png\"><\/span><\/p>\n<p>Security researchers have spotted a new variant of the Mirai IoT malware in the wild targeting two new classes of devices &#8211;smart signage TVs and wireless presentation systems.<\/p>\n<p>This new strain is being used by a new IoT botnet that security researchers from Palo Alto Networks have spotted earlier this year.<\/p>\n<p>The botnet&#8217;s author(s) appears to have invested quite a lot of their time in upgrading older versions of the Mirai malware with new exploits.<\/p>\n<p>Palo Alto Networks researchers say this new Mirai botnet uses 27 exploits, 11 of which are new to Mirai altogether, to break into smart IoT devices and networking equipment.<\/p>\n<p>Furthermore, the botnet operator has also expanded Mirai&#8217;s built-in list of default credentials, that the malware is using to break into devices that use default passwords. Four new username and password combos have been added to Mirai&#8217;s considerable list of default creds, researchers said in a <a href=\"https:\/\/unit42.paloaltonetworks.com\/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> published earlier today.<\/p>\n<p>The purpose and modus operandi of this new Mirai botnet are the same as all the previous botnets. Infected devices scan the internet for other IoT devices with exposed Telnet ports and use the default credentials (from their internal lists) to break in and take over these new devices.<\/p>\n<p>The infected bots also scan the internet for specific device types and then attempt to use one of the 27 exploits to take over unpatched systems.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Typically, Mirai botnets have targeted routers, modems, security cameras, and DVRs\/NVRs. In some very rare occasions, Mirai malware has ended up on smart TVs, smartphones, and some enterprise <a href=\"https:\/\/unit42.paloaltonetworks.com\/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall\/\" target=\"_blank\" rel=\"noopener noreferrer\">Linux and Apache Struts servers<\/a>. However, these are rare events.<\/p>\n<p>However, according to Palo Alto Networks researchers, this new Mirai botnet they spotted this year is intentionally targeting two new device types using specially crafted exploits, namely <a href=\"https:\/\/www.lg.com\/us\/business\/commercial-display\/displays-tvs\/commercial\/lg-supersign-tvs\" target=\"_blank\" rel=\"noopener noreferrer\">LG Supersign signage TVs<\/a> and <a href=\"https:\/\/www.barco.com\/en\/product\/wepresent-wipg-1000\" target=\"_blank\" rel=\"noopener noreferrer\">WePresent WiPG-1000 wireless presentation systems<\/a>.<\/p>\n<p>Both the exploits they&#8217;re using have been previously available online for months[<a href=\"https:\/\/www.exploit-db.com\/exploits\/45448\" target=\"_blank\" rel=\"noopener noreferrer\">1<\/a>, <a href=\"https:\/\/www.exploit-db.com\/exploits\/41935\" target=\"_blank\" rel=\"noopener noreferrer\">2<\/a>], but this is the first time these exploits have been weaponized.<\/p>\n<p>Palo Alto Networks&#8217; report detailing this new botnet comes just two days after security researcher Troy Mursch of Bad Packets highlighted a noticeable uptick in Mirai activity.<\/p>\n<div class=\"twitterContainer\" readability=\"6.1254019292605\">\n<blockquote class=\"twitter-tweet\" readability=\"6.5337620578778\">\n<p lang=\"en\" dir=\"ltr\">Mirai-like detections continue an upward trend over the last 60 days. Largest spike of activity happened in the last two weeks. <a href=\"https:\/\/twitter.com\/circl_lu?ref_src=twsrc%5Etfw\">@circl_lu<\/a> has shared a similar observation.<\/p>\n<p>Will botnets infected with Mirai-like <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\">#malware<\/a> ever go away? <a href=\"https:\/\/t.co\/MVMBHNa5lV\">pic.twitter.com\/MVMBHNa5lV<\/a><\/p>\n<p>\u2014 Bad Packets Report (@bad_packets) <a href=\"https:\/\/twitter.com\/bad_packets\/status\/1106813502495219713?ref_src=twsrc%5Etfw\">March 16, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<div class=\"twitterContainer\" readability=\"6.4812834224599\">\n<blockquote class=\"twitter-tweet\" readability=\"7.2914438502674\">\n<p lang=\"und\" dir=\"ltr\">Mirai-like <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\">#malware<\/a> infections last 365 days by port targeted: <a href=\"https:\/\/t.co\/jJ77DcDOO3\">https:\/\/t.co\/jJ77DcDOO3<\/a><\/p>\n<p>Top 10 ports\/services targeted:<br \/>23\/tcp \u2013 Telnet<br \/>5555\/tcp \u2013 ADB<br \/>2323\/tcp \u2013 Telnet<br \/>80\/tcp \u2013 HTTP<br \/>22\/tcp \u2013 SSH<br \/>8080\/tcp \u2013 HTTP<br \/>81\/tcp \u2013 HTTP<br \/>37215\/tcp \u2013 Huawei<br \/>8000\/tcp \u2013 HTTP<br \/>8081\/tcp \u2013 HTTP <a href=\"https:\/\/t.co\/kRhegcl8na\">pic.twitter.com\/kRhegcl8na<\/a><\/p>\n<p>\u2014 Bad Packets Report (@bad_packets) <a href=\"https:\/\/twitter.com\/bad_packets\/status\/1107094191752908800?ref_src=twsrc%5Etfw\">March 17, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<h3>Related malware and cybercrime coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers spot new Mirai botnet with an enhanced arsenal of IoT exploits.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26190,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-26189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Mirai malware variant targets signage TVs and presentation systems 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Mirai malware variant targets signage TVs and presentation systems 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T17:22:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Mirai malware variant targets signage TVs and presentation systems\",\"datePublished\":\"2019-03-18T17:22:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/\"},\"wordCount\":470,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/\",\"name\":\"New Mirai malware variant targets signage TVs and presentation systems 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png\",\"datePublished\":\"2019-03-18T17:22:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png\",\"width\":1000,\"height\":420},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Mirai malware variant targets signage TVs and presentation systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Mirai malware variant targets signage TVs and presentation systems 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/","og_locale":"en_US","og_type":"article","og_title":"New Mirai malware variant targets signage TVs and presentation systems 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-18T17:22:38+00:00","og_image":[{"width":1000,"height":420,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Mirai malware variant targets signage TVs and presentation systems","datePublished":"2019-03-18T17:22:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/"},"wordCount":470,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/","url":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/","name":"New Mirai malware variant targets signage TVs and presentation systems 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png","datePublished":"2019-03-18T17:22:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems.png","width":1000,"height":420},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-mirai-malware-variant-targets-signage-tvs-and-presentation-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"New Mirai malware variant targets signage TVs and presentation systems"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26189"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26189\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26190"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}