Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

// // //

A New BotNet Is Growing: Are You Already Part of Its Army?

The IoT_Reaper botnet is new and growing. Are your IoT devices already part of a criminal system that will cripple the Internet?

Botnets. The name sounds evil and the reality can be worse -- just ask Dyn, Brian Krebs or any of the other victims of Mirai or other botnets.

Now there's a new botnet in town -- named IoT_Reaper by the researchers who found it -- that is building its resources and biding its time until the next shoe inevitably drops.

This new botnet seems to have learned a number of lessons from Mirai and is using those lessons to remain less visible to defenses that have learned the ways of the older botnet. According to yegenshen, the researcher from Network Security Research Lab at 360 who first reported IoT_Reaper, the newer botnet software doesn't try to crack passwords. Instead, it simply looks to expoloit vulnerabilities that already exist on IoT devices.

IoT_Reaper is probing the same sort of devices enlisted by Mirai -- the sort of IoT devices owned in the hundreds by most enterprises -- but is doing so in a low-key fashion less likely to raise red flags in a Tripwire or other IDS infrastructure. It is scanning in a fashing described as "low-key," indicating that staying out of red-flag log files is a key aim of the software.

Once the malware is in place, it takes advantage of an integrated Lua execution environment which will allow hackers to transmit, interpret and execute complex malware scripts for many different purposes. Including Lua means that the basic botnet malware could be used by a wide variety of individuals who might or might not have prvious malware experience -- Lua is the leading scripting language used in games and has been the subject of many different books and articles.

As for what the original purpose of IoT_Reaper might be, the presence of approximately 100 open DNS servers means that a DNS-amplification DDoS attack would be quick to execute. yegenshen was quick to point out that there have been, as of this report, no IoT_Reaper-based DDoS attacks in the wild; right now, the botnet is being assembled for purposes no one outside the launching organization knows.

Checkpoint's Research Team also picked up the IoT_Reaper activity and have said that they have found more than a million organizations currently infected. They point out that the botnet malware seems to so far be focused on wireless IP cameras from a wide variety of vendors.

Image Courtesy of Checkpoint
Image Courtesy of Checkpoint

What's the proper course of action for IT managers and security team members? The first step is to read the research papers describing IoT_Reaper and see whether any of your internal devices are communicating with the command and control (C2) or other nodes of the growing botnet. Next make sure that your current network protection is looking for and protecting again traffic related to IoT_Reaper. Finally, start a scan of your IoT devices -- especially IP security cameras -- to make sure that the only code resident on the devices is code from the factory. If updates are available, now's a good time to deploy them.

While no one knows precisely why the IoT_Reaper botnet is being assembled, the odds are good that the purpose is going to be something that you won't like. You have the opportunity to get in front of this one before a terabit-per-second DDoS attack is launched using your systems. Seize the opportunity while it exists.

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file