Quantcast
Channel: CodeSection,代码区,Linux操作系统:Ubuntu_Centos_Debian - CodeSec
Viewing all articles
Browse latest Browse all 11063

IoT-based Linux/Mirai: Frequently Asked Questions

$
0
0

IoT-based Linux/Mirai: Frequently Asked Questions
Ever since the Mirai DDoS attack was launched a few weeks ago, we have received a number of questions that I will try to answer here. If you have more follow-up questions, please let me know! Who is the Author of Mirai?

The presumed developer goes under the pseudonym of 'Anna Senpai' on Hackforums - an English-speaking hacker forum.

His/her account on the forum is recent (July 2016). and was probably created when he/she started working on Mirai. For example:

July 10 - Begins "killing QBots" August 8 - Brute forcing telnet logins August 9 - Planning attack on OVH? . Hackers on the forum were obviously looking for a botnet to rent. Given this thread, it is possible OVH was not targeted by Mirai, or not by Mirai only. Other IoT botnets such as Kaiten are mentioned. Sept 19 - Discussing how to DDoS onion.to

The account does not reveal any personal data, apart from that Anna Senpei poses as a clever person, well informed on cybercriminality ( here or here , or here ), and arrogant .

His/her (actually, I'd vote for "he,” but that's a personal guess!) country of origin is unknown. The only possible hints are the following - but they could all be false leads:

Hack forum is an English speaking forum. Mirai means 'Future' in Japanese and in Chinese. Source code has references to Russian (could be copy/pasted) His/her skype login indicates he/she lives in Australia.

Finally, note that "Anna Senpai" is very probably the developer of Mirai, but may not have been involved in all of the DoS attacks attributed to Mirai. Indeed, as the source code was publicly released on Sept 30, 2016, other individuals or cybercriminal groups may have downloaded and used it. Some will say this strategy is quite shrewd to complicate attribution. ;) On a positive note, inspection of the source code makes the malware easier to understand and detect. It may be viewed on several github repositories: here , here and here .

Who is Behind the Attacks?

The most recent attack on Dyn was claimed by a group known as New World Hackers in retaliation for Ecuador's rescinding Internet access to WikiLeaks founder Julian Assange, who has been granted asylum at their embassy in London. Two members of this group said they did it to "test power.” So far, this claim hasn't been backed up by other data.

For other attacks: see the first question. Attribution is more difficult because the source code is now public.

Is the Malware Advanced?

The source code does not implement any particular "exploit" and is therefore relatively easy to write. It is, however, quite well written, and the implementation of all types of floods requires some network programming knowledge.

Anyway, contrary to general belief, a malware need not be "advanced" to be efficient: the KISS principle (Keep It Simple, Stupid) works very well for malware...

List of Attacks Attributed to linux/Mirai Date Where Rate Comments

Oct 21, 2016

Dyn DNS

1.2 Tbps?

Some of the attacks were coming from hosts infected with Mirai. Impacted Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix. New World Hacker group claimed responsibility. Size of botnet: 100,000.

Sept 22, 2016

OVH

1 Tbps

145,607 cameras and DVRs

Sept 13, 2016

KrebsOnSecurity.com

620 Gbps

More info from host Akamai

Aug 17, 2016

Incapsula

280 Gbps

Size of the botnet: 49,657 unique IPs. Most from CCTV cameras, DVRs and routers.

What is the Relationship of Mirai With Kaiten, Gafgyt, Bashlite etc? Comparing Tsunami

ELF/Gafgyt

Linux/Moose

PNscan

Linux/Remaiten

Mirai

Date

2013

2014

2015

2015

2016

2016

Aliases

Kaiten

Gayfgt, Bashlite

KTN-Remastered, KTN-RM

Propagation via IP scanning

Telnet (23)

On port 10073 or 23

SSH (22)

Telnet (23)

Telnet

Password brute force


Viewing all articles
Browse latest Browse all 11063

Trending Articles