Satori Adds Known Exploit Chain to Enslave Wireless IP Cameras
Rise of One More Mirai Worm Variant
When Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869 - SANS Internet Storm Center
Client talks on udp 9944 but server listens on 9943 · Issue #628 · polygraphene/ALVR · GitHub
Masafumi Negishi on Twitter: "Another moobot variant has been scanning 9530/tcp since May 25, mostly infected in Japan. The threat actor exploited CVE-2014-8361 on 52869/tcp. Many home routers in Japan remain vulnerable
Darknet - Satori strikes again | SISSDEN
Analyzing TCP port scan | D4 Project
JPCERT/CC Internet Threat Monitoring Report [January 1, 2019 ~ March 31 , 2019]
ZXHN H108N have port 52869 open · Issue #650 · threat9/routersploit · GitHub
Warning: Satori, a Mirai Branch Is Spreading in Worm Style on Port 37215 and 52869
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address
Darknet - early observations of Satori botnet | SISSDEN
nmap detect all port as open when run protonvpn : r/ProtonVPN