MESSAGE
DATE | 2017-02-11 |
FROM | Ruben Safir
|
SUBJECT | Subject: [Hangout-NYLXS] Internet of things DDOS threat
|
A successor to Mirai? Newly discovered malware aims to create fresh IoT
botnet
http://www.theregister.co.uk/2016/10/31/iot_botnet_wannabe/
Dubbed Linux/IRCTelnet, nasty's source code based on Aidra
botnet
reddit
Twitter
Facebook
linkedin
31 Oct 2016 at 17:13, John Leyden
Miscreants have put together a new strain of malware designed to turn
insecure IoT devices into a DDoS attack platform.
The new nasty, Linux/IRCTelnet discovered by security researchers at
MalwareMustDie.org, like the infamous Mirai botnet before it relies on
default hard-coded credentials to spread across vulnerable devices. The
malware is primed for DDoS and IPv6 ready, according to a write-up on
MalwareMustDie.org.
"The malware (the bot client) is designed to aim IoT device via telnet
protocol, by using its originally coded telnet scanner function, which
is brute-forcing the known vulnerable credential of the Linux IoT boxes,
via command sent from a CNC malicious IRC server,” the researchers note.
"The botnet is having DoS attack mechanism like UDP flood, TCP flood,
along with other attack methods, in both IPv4 and IPv6 protocol, with
extra IP spoof option in IPv4 or IPv6 too."
The source code used to build this botnet malware is based on the
earlier Aidra botnet, according to MalwareMustDie.org. Hard-coded
Italian language messages in the user's communication interface suggest
that the author of the retro-fitted malware is an Italian speaker.
Whether Linux/IRCTelnet is effective at spreading much less attacking
systems is so far unclear. Even so it's mere arrival is a concern
because it points to further trouble ahead.
Security experts are unsurprised that hackers are seeking to emulate the
"success" of the Mirai botnet, the malware linked to the attack on DNS
provider Dyn that shut down numerous websites on 21 October.
Mike Ahmadi, global director of critical systems security at Synopsys,
commented: "It is not at all surprising that a new exploit targeting
these devices has been discovered, since many of these devices are built
using open source third-party libraries. When we apply software
composition analysis tools to many of the most popular third-party
software distributions, we often find known vulnerabilities that number
in the hundreds, and sometimes in the thousands when looking at the
total software build found on IoT devices.
"Unless builders of IoT devices incorporate more rigorous vulnerability
detection and management practices into their development process, we
can expect more of this malware botnet free for all to occur." ®
--
So many immigrant groups have swept through our town
that Brooklyn, like Atlantis, reaches mythological
proportions in the mind of the world - RI Safir 1998
http://www.mrbrklyn.com
DRM is THEFT - We are the STAKEHOLDERS - RI Safir 2002
http://www.nylxs.com - Leadership Development in Free Software
http://www2.mrbrklyn.com/resources - Unpublished Archive
http://www.coinhangout.com - coins!
http://www.brooklyn-living.com
Being so tracked is for FARM ANIMALS and and extermination camps,
but incompatible with living as a free human being. -RI Safir 2013
_______________________________________________
hangout mailing list
hangout-at-nylxs.com
http://www.nylxs.com/
|
|