DDoS in The IoT - Mirai and Other Botnets PDF
DDoS in The IoT - Mirai and Other Botnets PDF
DDoS in The IoT - Mirai and Other Botnets PDF
T
siveness, and high vulnerability
of IoT devices have attracted many
he ubiquity and increasing popularity of the In- bad actors, particularly those orchestrating distributed
ternet of Things (IoT) have made IoT devices a denial-of-service (DDoS) attacks.
powerful amplifying platform for cyberattacks.
Given the recent headline-making severity and “THE FUTURE” IS HERE
frequent recurrence of security incidents involving such A recent prominent example is the Mirai botnet. First iden
devices, they’ve clearly become the new weakest link in tified in August 2016 by the whitehat security research group
the security chain of modern computer networks. IoT MalwareMustDie,1 Mirai—Japanese for “the future”—and
devices might be the feeble brother of desktop systems, its many variants and imitators have served as the vehicle
yet what they lack in computational capabilities they for some of the most potent DDoS attacks in history.
J U LY 2 0 1 7 81
CYBERTRUST
Communication sessions between bot and infrastructure Almost all stages of infection leave
1,200 a footprint that can be recognized
SYN through basic network analysis. Mirai
FIN signatures include
1,000 PSH + ACK (from infrastructure)
PSH + ACK (from bot)
›› sequentially testing specific
credentials in specific ports,
800 ›› sending reports that generate
Packet size (bytes)
distinctive patterns,
›› downloading a specific type of
600
binary code,
›› exchanging keep-alive
messages,
400
›› receiving attack commands that
have a specific structure, and
200 ›› generating attack traffic with
very few random elements.
T
file. The DDoS attack armory includes from its memory, and reconfiguring
User Datagram Protocol flooding at- network parameters. wo years ago we correctly pre-
tacks. An estimated 120,000 devices in dicted the emergence of IoT-
the wild are vulnerable to Persirai. LESSONS LEARNED powered DDoS attacks,20 and
The dramatic impact of DDoS attacks today increasingly sophisticated Mirai
OTHER IOT BOTNETS by Mirai, its variants, and other similar variants and imitators are appearing at
Following Mirai’s example, other IoT botnets highlight the risks IoT devices an alarming rate. This malware typi-
botnets have recently emerged. While pose to the Internet. Currently, even cally runs on multiple platforms and is
relying on the same basic principles, naive approaches can gain control of usually lightweight enough to execute
the authors of this malware are explor- such devices and create a massive and in a tiny amount of RAM. In addition,
ing increasingly sophisticated mech- highly disruptive army of zombie de- the infection process is relatively sim-
anisms to make their botnets more vices. The ease of infection and stabil- ple, making every vulnerable device a
powerful than the competition as well ity of the generated bot population are bot candidate even with frequent re-
as to obfuscate their activity. alluring factors for any attacker. booting. Although most existing IoT
The first IoT botnet written in the There are five main reasons IoT de- malware is easy to profile and detect,
Lua programming language was re- vices are particularly advantageous newer bots are stealthier.
ported by MalwareMustDie in late Au- for creating botnets: Much of the responsibility for DDoS
gust 2016.16 Most of its army is com- attacks often lies with users who prac-
posed of cable modems with ARM CPUs ›› Constant and unobtrusive opera- tice poor security behaviors and sys-
and using Linux. This malware incor- tion. Unlike laptop and desktop tem administrators who fail to deploy
porates sophisticated features such computers, which have frequent adequate safeguards. In the case of IoT
as an encrypted C&C communication on–off cycles, many IoT devices botnets, however, it’s device vendors
channel and customized iptables rules such as webcams and wireless who should assume the responsibil-
to protect infected devices. routers operate 24/7 and in ity for naively distributing products
The Hajime botnet, discovered in many cases aren’t properly rec- with weak security, including default
October 2016 by Rapidity Networks,17 ognized as computing devices. credentials and remote access capabil-
uses a method of infection similar to ›› Feeble protection. In their rush to ities. IoT vendors are also in a unique
that of Mirai. However, rather than penetrate the IoT market, many position to provide the automated
J U LY 2 0 1 7 83
CYBERTRUST
security updates that would address preprint, 13 Feb. 2017, arXiv:1702 Infosecurity Mag., 20 Apr. 2017; www
the problem. Solutions that require .03681. .infosecurity-magazine.com/news
manual intervention—for example, 9. B. Herzberg, D. Bekerman, and I. /mirai-busting-hajime-worm-could.
frequently changing passwords—are Zeifman, “Breaking Down Mirai: An 19. “‘BrickerBot’ Results in PDoS At-
unrealistic in the IoT realm, where IoT DDoS Botnet Analysis,” blog, Im- tack,” Radware, 5 Apr. 2017; security
many devices must be self-regulating. perva Incapsula, 26 Oct. 2016; www .radware.com/ddos-threats-attacks
What we need now is the technical .incapsula.com/blog/malware /brickerbot-pdos-permanent-denial
means to enforce security best prac- -analysis-mirai-ddos-botnet.html. -of-service.
tices in computer networks as well as 10. S.S.C. Silva et al., “Botnets: A 20. C. Kolias, A. Stavrou, and J. Voas,
robust security standards for IoT de- Survey,” Computer Networks, vol. 57, “Securely Making ‘Things’ Right,”
vices and distributors. no. 2, 2013, pp. 378–403. Computer, vol. 48, no. 9, 2015,
11. Distributed Denial of Service (DDoS) pp. 84–88.
Threat Report: Q4 2016, threat report
REFERENCES 20170222-EN-A4, Nexusguard, 2017;
1. “MMD-0055-2016-Linux/PnScan; news.nexusguard.com/threat
ELF Worm That Still Circles Around,” -advisories/q4-2016-ddos-threat CONSTANTINOS KOLIAS is a
blog, MalwareMustDie, 24 Aug. 2016; -report. research assistant professor in the
blog.malwaremustdie.org/2016/08 12. “New Mirai Worm Knocks 900K Ger- Department of Computer Science at
/mmd-0054-2016-pnscan-elf-worm mans Offline,” blog, KrebsOnScurity, George Mason University as well as
-that.html. 16 Nov. 2016; krebsonsecurity.com lead engineer for the first IoT labora-
2. “KrebsOnSecurity Hit with Record /2016/11/new-mirai-worm-knocks tory at NIST. Contact him at kkolias@
DDoS,” blog, KrebsOnSecurity, 16 -900k-germans-offline. gmu.edu.
Sept. 2016; krebsonsecurity.com 13. D. Bekerman, “New Mirai Variant
/2016/09/krebsonsecurity-hit Launches 54 Hour DDoS Attack GEORGIOS KAMBOURAKIS is
-with-record-ddos. against US College,” blog, Imperva an associate professor in the
3. D. Goodin, “Record-Breaking DDoS Incapsula, 29 Mar. 2017; www Department of Information and
Reportedly Delivered by >145K .incapsula.com/blog/new-mirai Communication Systems Security
Hacked Cameras,” Ars Technica, 28 -variant-ddos-us-college.html. and director of the Laboratory of
Sept. 2016; arstechnica.com/security 14. D. McMillen and M. Alvarez, “Mirai Information and Communication
/2016/09/botnet-of-145k-cameras IoT Botnet: Mining for Bitcoins?,” Systems Security (Info Sec Lab)
-reportedly-deliver-internets-biggest Security Intelligence, 10 Apr. 2017; at the University of the Aegean.
-ddos-ever. securityintelligence.com/mirai-iot Contact him at [email protected].
4. J. Gamblin, “Mirai-Source-Code,” -botnet-mining-for-bitcoins.
GitHub; github.com/jgamblin/Mirai 15. T. Yeh, D. Chiu, and K. Lu, “Persirai: ANGELOS STAVROU is a professor
-Source-Code/blob/master/Forum New Internet of Things (IoT) Botnet in the Department of Computer
Post.txt. Targets IP Cameras,” blog, Trend- Science and director of the Center
5. C. Cimpanu, “You Can Now Rent Labs, 9 May 2017; blog.trendmicro for Assurance Research and
a Mirai Botnet of 400,000 Bots,” .com/trendlabs-security-intelligence Engineering (CARE) at George
BleepingComputer.com, 24 Nov. 2016; /persirai-new-internet-things-iot Mason University. Contact him at
www.bleepingcomputer.com/news -botnet-targets-ip-cameras. [email protected].
/security/you-can-now-rent-a-mirai 16. “MMD-0057-2016-Linus/LuaBot-IoT
-botnet-of-400-000-bots. Botnet as Service,” blog, Malware JEFFREY VOAS is a Fellow of
6. C. Williams, “Today the Web Was MustDie, 6 Sept. 2016; blog IEEE as well as of the American
Broken by Countless Hacked .malwaremustdie.org/2016/09 Association for the Advancement of
Devices—Your 60-Second Summary,” /mmd-0057-2016-new-elf-botnet Science (AAAS) and the Institution
The Register, 21 Oct. 2016; www -linuxluabot.html. of Engineering and Technology (IET).
.theregister.co.uk/2016/10/21/dyn 17. S. Edwards and I. Profetis, “Hajime: Contact him at [email protected].
_dns_ddos_explained. Analysis of a Decentralized Internet
7. E. Bertino and N. Islam, “Botnets and Worm for IoT Devices,” Rapidity Net-
Internet of Things Security,” Com- works; 16 Oct. 2016; security
puter, vol. 50, no. 2, 2017, pp. 76–79. .rapiditynetworks.com/publications Read your subscriptions
8. K. Angrishi, “Turning I nternet of /2016-10-16/hajime.pdf. through the myCS
publications portal at
Things (IoT) into Internet of Vul 18. P. Muncaster, “Mirai-Busting Hajime
http://mycs.computer.org
nerabilities (IoV): IoT Botnets,” arXiv Worm Could Be Work of White Hat,”