Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

10/24/2017
04:00 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Curt Franklin
50%
50%

A New BotNet Is Growing: Are You Already Part of Its Army?

The IoT_Reaper botnet is new and growing. Are your IoT devices already part of a criminal system that will cripple the Internet?

Botnets. The name sounds evil and the reality can be worse -- just ask Dyn, Brian Krebs or any of the other victims of Mirai or other botnets.

Now there's a new botnet in town -- named IoT_Reaper by the researchers who found it -- that is building its resources and biding its time until the next shoe inevitably drops.

This new botnet seems to have learned a number of lessons from Mirai and is using those lessons to remain less visible to defenses that have learned the ways of the older botnet. According to yegenshen, the researcher from Network Security Research Lab at 360 who first reported IoT_Reaper, the newer botnet software doesn't try to crack passwords. Instead, it simply looks to expoloit vulnerabilities that already exist on IoT devices.

IoT_Reaper is probing the same sort of devices enlisted by Mirai -- the sort of IoT devices owned in the hundreds by most enterprises -- but is doing so in a low-key fashion less likely to raise red flags in a Tripwire or other IDS infrastructure. It is scanning in a fashing described as "low-key," indicating that staying out of red-flag log files is a key aim of the software.

Once the malware is in place, it takes advantage of an integrated Lua execution environment which will allow hackers to transmit, interpret and execute complex malware scripts for many different purposes. Including Lua means that the basic botnet malware could be used by a wide variety of individuals who might or might not have prvious malware experience -- Lua is the leading scripting language used in games and has been the subject of many different books and articles.

As for what the original purpose of IoT_Reaper might be, the presence of approximately 100 open DNS servers means that a DNS-amplification DDoS attack would be quick to execute. yegenshen was quick to point out that there have been, as of this report, no IoT_Reaper-based DDoS attacks in the wild; right now, the botnet is being assembled for purposes no one outside the launching organization knows.

Checkpoint's Research Team also picked up the IoT_Reaper activity and have said that they have found more than a million organizations currently infected. They point out that the botnet malware seems to so far be focused on wireless IP cameras from a wide variety of vendors.

Image Courtesy of Checkpoint
Image Courtesy of Checkpoint

What's the proper course of action for IT managers and security team members? The first step is to read the research papers describing IoT_Reaper and see whether any of your internal devices are communicating with the command and control (C2) or other nodes of the growing botnet. Next make sure that your current network protection is looking for and protecting again traffic related to IoT_Reaper. Finally, start a scan of your IoT devices -- especially IP security cameras -- to make sure that the only code resident on the devices is code from the factory. If updates are available, now's a good time to deploy them.

While no one knows precisely why the IoT_Reaper botnet is being assembled, the odds are good that the purpose is going to be something that you won't like. You have the opportunity to get in front of this one before a terabit-per-second DDoS attack is launched using your systems. Seize the opportunity while it exists.

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19551
PUBLISHED: 2021-09-21
Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.
CVE-2020-19553
PUBLISHED: 2021-09-21
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
CVE-2021-40847
PUBLISHED: 2021-09-21
The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by ...
CVE-2021-41084
PUBLISHED: 2021-09-21
http4s is an open source scala interface for HTTP. In affected versions http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: Header names (`Header.name`Ã¥), Header values (`Header.value`), Status r...
CVE-2021-23443
PUBLISHED: 2021-09-21
This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.