Mirai is the hydra of IoT security: too many heads to cut off

Some botnets have been disbanded, but new uses continue to emerge

IDG

IDG

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.

The malicious code became publicly available in late September. Since then, it’s been blamed for enslaving IoT devices such as DVRs and internet cameras to launch massive distributed denial-of-service attacks, one of which disrupted internet access across the U.S. in October.

The good news: Last month, police arrested one suspected hacker who may have been behind several Mirai-related DDoS attacks.

In addition, internet backbone provider Level 3 Communications has said it's made a dent in stopping the Mirai malware.

The malicious code has been found on 500,000 to 600,000 IoT devices at one time or another. But the vast majority of those now are “stranded” and no longer under the control of hackers, said Level 3 Chief Security Officer Dale Drew.

That’s because ISPs, including Level 3, are blocking internet access to the servers that hackers are using to control the Mirai-infected devices.

“We had previously been taking down Mirai C2s (command and control servers) monthly, then weekly,” Drew said in an email. “Now, we’re taking them down every four hours.”

This has left only about 97,000 Mirai-infected devices out on the Internet that can be controlled by malicious parties. That doesn’t mean the malware isn't still a threat, Level 3 said.

The bad news: Hackers are still modifying the Mirai source code to infect new devices.

On Monday, security research group Malware Must Die said it found evidence that Chinese hackers were repurposing Mirai to infect a batch of IoT products, in this case from a Taiwanese vendor.

“This could have a huge impact,” the research group said in a direct message over Twitter. “Chinese hackers who used to make DDoS Linux malware are starting to adapt the Mirai source code.”

screen shot 2017 03 13 at 4.48.23 pm Malware Must Die

A screenshot of the DDoS client from the Chinese hackers.

The Chinese hackers appear to have modified the malicious coding to exploit a known vulnerability in products from Avtech, a maker of DVRs and internet cameras.

The new strain of Mirai takes advantage of a web scripting bug in the products, triggering them to visit a URL that downloads the hackers’ malware.

There are about 160,000 devices on the internet that could be vulnerable to the attack, Malware Must Die said. A security researcher has contacted the Avtech about the problem, but it’s unclear if the vendor has issued a patch.

Lingering dangers: Things could get worse.

Authorities may have arrested one suspected hacker connected with Mirai, but others have been making video tutorials on how to use the source code and uploading them to YouTube.

“It really is chopping the head off a hydra,” said Bryant Townsend, CEO of Backconnect, in a reference to the mythical many-headed serpent.

Backconnect, a DDoS protection provider, estimates there are about 250,000 to 300,000 IoT devices still infected with Mirai.

The company gave a higher estimate than Level 3 because it’s detected newer strains of Mirai infecting IoT devices using other known exploits, said Marshal Webb, Backconnect’s CTO.

“That (number) can easily rise into the millions,” he said. For example, it wouldn’t be hard for a hacker to Google known vulnerabilities in IoT devices and then incorporate that information into the Mirai source code, Webb said.

Some existing Mirai strains are also still scanning the internet, looking to infect vulnerable devices.

Johannes Ullrich, a security researcher with the SANS Technology Institute, said on Monday he recently connected his DVR to the internet to see if Mirai would try to infect it.

“Within 5 minutes, it was compromised,” he said.

Although ISPs like Level 3 are reporting progress against Mirai, Ullrich said the tech industry still hasn’t resolved the root problem that’s been fueling the malware’s growth: insecure IoT products that can be easily hacked. That needs to change.

“You still have all these vulnerable devices out there,” he said. “The number of patched devices is still fairly minuscule.”

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Michael Kan

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?