Quantcast
Channel: Networks Asia - IT news
Viewing all articles
Browse latest Browse all 2029

Mirai is the hydra of IoT security: too many heads to cut off

$
0
0

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.

The malicious code became publicly available in late September. Since then, it’s been blamed for enslaving IoT devices such as DVRs and internet cameras to launch massive distributed denial-of-service attacks, one of which disrupted internet access across the U.S. in October.

The good news: Last month, police arrested one suspected hacker who may have been behind several Mirai-related DDoS attacks.

In addition, internet backbone provider Level 3 Communications has said it's made a dent in stopping the Mirai malware.

The malicious code has been found on 500,000 to 600,000 IoT devices at one time or another. But the vast majority of those now are “stranded” and no longer under the control of hackers, said Level 3 Chief Security Officer Dale Drew.

That’s because ISPs, including Level 3, are blocking internet access to the servers that hackers are using to control the Mirai-infected devices.

“We had previously been taking down Mirai C2s (command and control servers) monthly, then weekly,” Drew said in an email. “Now, we’re taking them down every four hours.”

This has left only about 97,000 Mirai-infected devices out on the Internet that can be controlled by malicious parties. That doesn’t mean the malware isn't still a threat, Level 3 said.

The bad news: Hackers are still modifying the Mirai source code to infect new devices.

On Monday, security research group Malware Must Die said it found evidence that Chinese hackers were repurposing Mirai to infect a batch of IoT products, in this case from a Taiwanese vendor.

“This could have a huge impact,” the research group said in a direct message over Twitter. “Chinese hackers who used to make DDoS Linux malware are starting to adapt the Mirai source code.”

MALWARE MUST DIE

A screenshot of the DDoS client from the Chinese hackers.

The Chinese hackers appear to have modified the malicious coding to exploit a known vulnerability in products from Avtech, a maker of DVRs and internet cameras.

The new strain of Mirai takes advantage of a web scripting bug in the products, triggering them to visit a URL that downloads the hackers’ malware.

There are about 160,000 devices on the internet that could be vulnerable to the attack, Malware Must Die said. A security researcher has contacted the Avtech about the problem, but it’s unclear if the vendor has issued a patch.   

Lingering dangers: Things could get worse.

Authorities may have arrested one suspected hacker connected with Mirai, but others have been making video tutorials on how to use the source code and uploading them to YouTube.

“It really is chopping the head off a hydra,” said Bryant Townsend, CEO of Backconnect, in a reference to the mythical many-headed serpent.

Backconnect, a DDoS protection provider, estimates there are about 250,000 to 300,000 IoT devices still infected with Mirai.

The company gave a higher estimate than Level 3 because it’s detected newer strains of Mirai infecting IoT devices using other known exploits, said Marshal Webb, Backconnect’s CTO.

“That (number) can easily rise into the millions,” he said. For example, it wouldn’t be hard for a hacker to Google known vulnerabilities in IoT devices and then incorporate that information into the Mirai source code, Webb said.

Some existing Mirai strains are also still scanning the internet, looking to infect vulnerable devices.

Johannes Ullrich, a security researcher with the SANS Technology Institute, said on Monday he recently connected his DVR to the internet to see if Mirai would try to infect it.

“Within 5 minutes, it was compromised,” he said.

Although ISPs like Level 3 are reporting progress against Mirai, Ullrich said the tech industry still hasn’t resolved the root problem that’s been fueling the malware’s growth: insecure IoT products that can be easily hacked. That needs to change.

“You still have all these vulnerable devices out there,” he said. “The number of patched devices is still fairly minuscule.”


Viewing all articles
Browse latest Browse all 2029

Trending Articles