Menu
IoT malware behind record DDoS attack is now available to all hackers

IoT malware behind record DDoS attack is now available to all hackers

The Mirai trojan enslaved over 380,000 IoT devices, its creator claims

The source code for a trojan program that infected hundreds of thousands of internet-of-things devices and used them to launch distributed denial-of-service attacks has been published online, paving the way for more such botnets.

The code for the trojan, which its creator calls Mirai, was released Friday on an English-language hackers' forum, cybersecurity blogger Brian Krebs reported over the weekend. Krebs' website was the target of a record DDoS attack two weeks ago that was launched from the Mirai botnet.

The trojan's creator, who uses the online handle Anna-senpai, said that the decision to release the source code was taken because there's a lot of attention now on IoT-powered DDoS attacks and he wants to get out of this business.

Mirai used to enslave around 380,000 IoT devices every day using brute-force Telnet attacks, according to Anna-senpai. However, after the DDoS attack against krebsonsecurity.com, ISPs have started to take action and block compromised devices, so the daily rate of Mirai infections has dropped to 300,000 and is likely to go down even further, the malware writer said.

It's worth noting that unlike malware infections on desktop computers, infections on IoT and embedded devices are usually temporary and disappear when those devices are rebooted because they use volatile storage. In order to maintain their size, IoT botnets need to find and reinfect devices every single day.

The hijacking of home routers, DSL modems, digital video recorders, network-attached storage systems and other such devices to launch DDoS attacks is not new. For example, in October 2015, security firm Incapsula mitigated a DDoS attack launched from around 900 closed-circuit television (CCTV) cameras.

However, the IoT DDoS botnets seem to have reached their full potential over the past few months. After the unprecedented 620Gbps DDoS attack against Krebs' website two weeks ago, French server hosting firm OVH was hit with a 799Gbps DDoS attack launched from a botnet of over 140,000 hacked digital video recorders and IP cameras.

Such a large botnet is capable of launching crippling attacks that could easily exceed 1Tbps, the OVH's CTO warned at the time.

There are very few DDoS mitigation providers in the world who are capable of protecting customers against 1Tbps attacks. Content delivery network Akamai, which also offers DDoS protection services, dropped Krebs as a customer when his website was recently attacked because the attack was too costly to mitigate.

And things are only going to get worse because the market of IoT devices is rapidly expanding and many of these devices come with basic security holes, such as remote administrative interfaces exposed to the Internet and protected with weak credentials that users never change.

The release of Mirai's source code is very likely to lead to the creation of more IoT botnets, and it wouldn't be the first time. In early 2015 the source code for LizardStresser, a DDoS bot for Linux systems written by the infamous Lizard Squad attacker group, was released online. As of June this year, security researchers had identified over 100 botnets built using malware based on LizardStresser.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags ddosIoT

Events

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments