Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security //

Botnet

2/16/2018
10:35 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

DoubleDoor IoT Botnet Is a Harbinger of Exploits to Come

NewSky researchers are looking into DoubleDoor, a new type of IoT botnet that combines two exploits together. It also shows what kind of security challenges lie ahead for the enterprise.

Ankit Anubhav, a principal researcher at NewSky Security, has written about the firm's discovery of a new Internet of Things (IoT) botnet that will -- for the first time -- bypass enterprise firewalls by bundling two exploits together.

Dubbed DoubleDoor in the February 13 report, the malware will incorporate two well-known backdoor exploits to avoid the two levels of authentication that may be placed between a device and the Internet.

This kind of double-layered attack is the first to be seen in botnet-based exploits. Typically, they are usually associated with Windows-based attacks.

First, the bonnet uses CVE-2015–7755 -- also known as the Juniper Networks SmartScreen OS exploit -- to get past firewall authentication. Once this is done, it then takes advantage of CVE-2016–10401 -- the ZyXEL modem backdoor exploit -- to gain control of the device.

It was when this previously unknown botnet exploited these vulnerabilities within NewSky's honeypots that researchers began to look deeper at the malware.

The firewall exploit is a backdoor in Juniper Networks' ScreenOS software. The software is what powers the company's Netscreen firewalls. An attacker will grab onto the telnet and SSH daemons by the use of a hardcoded password that is inside the Juniper device.

This will allow any user name an attacker may supply to get through the ScreenOS software as being authenticated.

The same method is used for the ZyXEL PK5001Z devices. A known password is used to gain access. Once the bot is in the network as a regular user, a privilege access escalation exploit is performed in order to gain "superuser" status.

It then performs an unusual trick of trying to validate its escalated privilege by invoking the shell with some sort of invalid command. If this command is a static string value, it allows for an easier detection of the malware activity.

However, DoubleDoor uses a randomized string for this activity. Although it is always eight characters in length, it will vary in each confirmation attempt. This will make static- and behavioral-based detection harder to do.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

The attack has not yet found to be widespread. NewSky found that scans and exploitation attempts for this botnet were spotted between January 18 and January 27, and all of them originated from South Korean IP addresses.

The structure of the targets of the attack are similar to those found in corporate networks. While DoubleDoor may be a work in progress, what it attempts to achieve indicates what that work is ultimately concentrating on. It points to a different way to breach enterprise networks.

Perhaps the same layering methods can be used to attack other embedded devices by using other exploits. If nothing else, it can serve as an example to other IoT botnet creators of a new and different method that they may adopt for their own nefarious purposes.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8720
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
CVE-2020-12300
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-12301
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-7307
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
CVE-2020-8679
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.