create account

New IoT Botnets Emerge by mrosenquist

View this thread on: hive.blogpeakd.comecency.com
· @mrosenquist ·
$9.37
New IoT Botnets Emerge
<html>
<p><center><img src="https://i.imgsafe.org/cf136853ca.png" width="650" height="366"/></center></p>
<p>On the heels of severe Distributed Denial of Service (DDoS) attacks, new Internet-of-Things (IoT) powered botnets are emerging. There are already hundreds of such botnets which exist in the underground hacking ecosystem, where services, code, and specific attacks can be purchased or acquired. New botnets are being developed to meet the growing demand and to circumvent anticipated security controls. &nbsp;</p>
<h2><strong>The latest IoT botnet</strong></h2>
<p>Researchers have <a href="http://blog.malwaremustdie.org/2016/10/mmd-0059-2016-linuxirctelnet-new-ddos.html">spotted a new IoT botnet</a> called <strong>Linux/IRCTelnet</strong>. In just 5 days it <a href="http://arstechnica.com/security/2016/11/new-iot-botnet-that-borrows-from-notorious-mirai-infects-3500-devices/">infected 3500 devices</a> and features an old-school adaptation: using Internet Relay Chat (IRC) as the command and control structure. &nbsp;IRC is a very old technology based upon original chat-boards of the Internet (pre world-wide-web). &nbsp;Many of the original botnets used IRC, a decade ago. &nbsp;It is not particularly difficult to undermine for security software, therefore represents an interesting choice by the attackers, whom I assume are not top-tier (ie. not nation state level). &nbsp;&nbsp;&nbsp;</p>
<p>Linux/IRCTelnet is not based upon the popular Mirai IoT DDoS botnet software, but rather <a href="http://www.theregister.co.uk/2016/10/31/iot_botnet_wannabe/">Aidra code</a>. &nbsp;It does however leverage default passwords of IoT devices to gain control. &nbsp;It is just the easiest path at the moment. &nbsp;Attackers will evolve as that door closes, so don’t get too excited and think we can ‘solve’ IoT security with the elimination of default passwords. &nbsp;It is just one chess-move in a long game we are begrudgingly forced to play. Although this Linux bot is still new and small, it could hold potential for more directed attacks and highlights how malware writers are working to differentiate their attack code. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>
<h2><strong>More targets will be explored.</strong> &nbsp;</h2>
<p>We are already seeing a broad diversity of different telecommunications, political, business, Internet infrastructure, and social sites being targeted. The latest is an attack against the internet access for the <a href="http://www.bbc.com/news/technology-37859678">country of Liberia</a>. Access to the web has been spotty for customers with attackers at times pushing over 600 Gb/s of data to choke the network. Most access is provided by the African Coast to Europe (ACE) undersea cable and these attacks could affect many other nations in West Africa who rely on this data pipeline. &nbsp;&nbsp;</p>
<h2><strong>What comes next?</strong>&nbsp;</h2>
<p>Expect many more entry-level botnets, which will eventually be supplanted by more professional malware. Thus far, most of the IoT botnets have been basic. This will change as more professional and well-funded players emerge. &nbsp;&nbsp;&nbsp;</p>
<h3>Look for the pro’s to do the following when they come into this space:&nbsp;</h3>
<ol>
  <li>Patch/change-passwords of the victim IoT devices after infection, so others can’t take over their prey&nbsp;</li>
  <li>Setup more sophisticated and concealed Command and Control (C2) structures to make it more difficult to track bot-herders or interfere with their control&nbsp;</li>
  <li>Implement encrypted communications to the end-nodes, to conceal instructions, updates, and new targeting instructions&nbsp;</li>
  <li>Begin exploiting OS/RTOS vulnerabilities on higher-end devices to gain more functionality and persistence&nbsp;</li>
  <li>Begin siphoning data from IoT devices, which can be valuable for many different purposes, including extending attacks further into homes, businesses, and governments &nbsp;&nbsp;</li>
</ol>
<p><br></p>
<p>I predict the next phase of availability attacks will begin right around the time the industry reaches the tipping point in addressing the ‘default’ password weaknesses. Then confidentiality attacks, followed by integrity compromises will come. Brace for a long fight as IoT devices are <a href="https://www.linkedin.com/pulse/top-5-things-know-recent-iot-attacks-matthew-rosenquist">highly coveted by attackers</a>. This matchup should be exciting as it unfolds!&nbsp;</p>

<p><br></p>
<p><img src="https://img1.steemit.com/0x0/http://i.imgsafe.org/dd8bd8753d.gif" width="156" height="70"/></p>
<p>Interested in more? Follow me on <a href="https://twitter.com/Matt_Rosenquist">Twitter (@Matt_Rosenquist)</a> and <a href="https://www.linkedin.com/today/author/matthewrosenquist">LinkedIn</a> to hear insights and what is going on in cybersecurity.</p>
</html>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authormrosenquist
permlinknew-iot-botnets-emerge
categorysecurity
json_metadata{"tags":["security","hack","life","news","technology"],"image":["https://i.imgsafe.org/cf136853ca.png","https://img1.steemit.com/0x0/http://i.imgsafe.org/dd8bd8753d.gif"],"links":["http://blog.malwaremustdie.org/2016/10/mmd-0059-2016-linuxirctelnet-new-ddos.html","http://arstechnica.com/security/2016/11/new-iot-botnet-that-borrows-from-notorious-mirai-infects-3500-devices/","http://www.theregister.co.uk/2016/10/31/iot_botnet_wannabe/","http://www.bbc.com/news/technology-37859678","https://www.linkedin.com/pulse/top-5-things-know-recent-iot-attacks-matthew-rosenquist","https://twitter.com/Matt_Rosenquist","https://www.linkedin.com/today/author/matthewrosenquist"],"app":"steemit/0.1","format":"html"}
created2016-11-04 20:42:00
last_update2016-11-04 20:42:00
depth0
children3
last_payout2016-12-05 21:56:51
cashout_time1969-12-31 23:59:59
total_payout_value7.062 HBD
curator_payout_value2.306 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,865
author_reputation178,128,965,781,896
root_title"New IoT Botnets Emerge"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,687,861
net_rshares35,552,879,303,965
author_curate_reward""
vote details (45)
@billykeed ·
interesting and scary
👍  ,
properties (23)
authorbillykeed
permlinkre-mrosenquist-new-iot-botnets-emerge-20161104t205759981z
categorysecurity
json_metadata{"tags":["security"]}
created2016-11-04 20:58:00
last_update2016-11-04 20:58:00
depth1
children2
last_payout2016-12-05 21:56:51
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length21
author_reputation29,229,035,547,912
root_title"New IoT Botnets Emerge"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,687,958
net_rshares44,632,042,718
author_curate_reward""
vote details (2)
@mrosenquist ·
The worst is likely still to come.
properties (22)
authormrosenquist
permlinkre-billykeed-re-mrosenquist-new-iot-botnets-emerge-20161105t031640341z
categorysecurity
json_metadata{"tags":["security"]}
created2016-11-05 03:16:39
last_update2016-11-05 03:16:39
depth2
children1
last_payout2016-12-05 21:56:51
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length34
author_reputation178,128,965,781,896
root_title"New IoT Botnets Emerge"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,690,141
net_rshares0
@billykeed ·
True that. Hate that they using my OS  Linux for their shenanigans
properties (22)
authorbillykeed
permlinkre-mrosenquist-re-billykeed-re-mrosenquist-new-iot-botnets-emerge-20161105t031849634z
categorysecurity
json_metadata{"tags":["security"]}
created2016-11-05 03:18:51
last_update2016-11-05 03:18:51
depth3
children0
last_payout2016-12-05 21:56:51
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length66
author_reputation29,229,035,547,912
root_title"New IoT Botnets Emerge"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,690,147
net_rshares0