Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that\u2019s spreading through recently disclosed vulnerabilities in the products. \u00a0The malware, called Persirai, has been found infecting Chinese-made wireless cameras since last month, security firm Trend Micro said on Tuesday. The malware does so by exploiting flaws in the cameras that a security researcher reported back in March. \u00a0The researcher, Pierre Kim, found that the vulnerabilities can allow an attacker to remotely execute code on the cameras, effectively hijacking them.At least 1,250 camera models produced by a Chinese manufacturer possess the bugs, the researcher went on to claim.Over a month later in April, Trend Micro noticed a new malware that spreads by exploiting the same products via the recently disclosed flaws.\u201cIt goes to show that the people behind this are probably more aware of how to use these vulnerabilities,\u201d said Jon Clay, Trend Micro\u2019s director of global threat communications.The security firm estimates that about 120,000 cameras are vulnerable to the malware, based on Shodan, a search engine for internet-connected hardware.The Persirai malware is infecting the cameras to form a botnet, or an army of enslaved computers. These botnets can launch DDoS attacks, which can overwhelm websites with internet traffic, forcing them offline.Once Persirai infects, it\u2019ll also block anyone else from exploiting the same vulnerabilities on the device.Security firm Qihoo 360 has also noticed the malware and estimated finding 43,621 devices in China infected with it.\u00a0Interestingly, Persirai borrows some computer code from a notorious malware known as Mirai, which has also been infecting IoT devices, such as DVRs, internet routers, and CCTV cameras, but by guessing the passwords protecting them.\u00a0Specifically, Persirai lifts certain functions Mirai relies on to scan the internet for new devices to infect, said Marshal Webb, CTO of BackConnect, a DDoS protection provider.Although the resulting Persirai-powered botnet is capable of launching DDoS attacks, it\u2019s largely refrained from assaulting any websites for the moment, probably because the malware developers are still testing how to use it.\u00a0\u201cThe security researcher, a white hat, may have had the best intentions with releasing a full disclosure on these vulnerabilities,\u201d Webb said. \u201cBut now they're just out there, making it convenient for anyone to exploit.\u201dThe researcher, Pierre Kim, didn't immediately respond to a request for comment, but he noted "difficulties" with finding and contacting all the vendors involved, in a blog post about the disclosure.\u00a0However, Trend Micro has identified the primary Chinese manufacturer behind the cameras and is working with it to roll out a patch.\u00a0The security firm is declining to name the manufacturer until the patch is published. Until then, it\u2019s hard to know what exact products and brands may be vulnerable, since so many models appear to be affected.However, owners can protect a vulnerable device by placing it behind a firewall, and blocking access to the malware\u2019s command and control servers, which are located in Iran. Trend Micro has provided more technical details to Persirai in a blog post. \u00a0Let us know what you think. Head to our Facebook page to leave a comment.