Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 683

Mirai Botnet

What is Mirai Botnet?

Mirai BotnetAn IoT malware family first seen in 2016 that recruits routers, cameras, and DVRs through default credentials and was used in the Dyn DNS DDoS that broke much of the U.S. internet.


Mirai is an IoT malware family first identified in August 2016 that scans the internet for Linux-based devices — routers, IP cameras, DVRs — exposing Telnet (and later SSH) with a list of well-known default credentials. Infected devices report to a C2 server and can launch high-volume DDoS attacks, including HTTP, UDP, TCP-SYN, and DNS amplification. Mirai was used in the September 2016 attack on Brian Krebs's site (~620 Gbps), the October 2016 attack on DNS provider Dyn that disrupted Twitter, Spotify, Netflix, and many other services, and an attack on the French hoster OVH (>1 Tbps). The source code was released publicly in October 2016, spawning many forks (Satori, Okiru, Owari, Mozi). Three U.S.-based authors (Paras Jha, Josiah White, Dalton Norman) later pleaded guilty.

Examples

  1. 01

    Scanning the IPv4 internet for Telnet on port 23 and brute-forcing 60+ default credentials such as admin/admin and root/xc3511.

  2. 02

    Launching a multi-Tbps DDoS that knocked the DNS provider Dyn offline in October 2016.

Frequently asked questions

What is Mirai Botnet?

An IoT malware family first seen in 2016 that recruits routers, cameras, and DVRs through default credentials and was used in the Dyn DNS DDoS that broke much of the U.S. internet. It belongs to the OT / ICS / IoT category of cybersecurity.

What does Mirai Botnet mean?

An IoT malware family first seen in 2016 that recruits routers, cameras, and DVRs through default credentials and was used in the Dyn DNS DDoS that broke much of the U.S. internet.

How does Mirai Botnet work?

Mirai is an IoT malware family first identified in August 2016 that scans the internet for Linux-based devices — routers, IP cameras, DVRs — exposing Telnet (and later SSH) with a list of well-known default credentials. Infected devices report to a C2 server and can launch high-volume DDoS attacks, including HTTP, UDP, TCP-SYN, and DNS amplification. Mirai was used in the September 2016 attack on Brian Krebs's site (~620 Gbps), the October 2016 attack on DNS provider Dyn that disrupted Twitter, Spotify, Netflix, and many other services, and an attack on the French hoster OVH (>1 Tbps). The source code was released publicly in October 2016, spawning many forks (Satori, Okiru, Owari, Mozi). Three U.S.-based authors (Paras Jha, Josiah White, Dalton Norman) later pleaded guilty.

How do you defend against Mirai Botnet?

Defences for Mirai Botnet typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mirai Botnet?

Common alternative names include: Mirai, Mirai malware.

Related terms

See also