Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

10/30/2018
09:35 AM
Black Hat Staff
Black Hat Staff
News Analysis-Security Now
50%
50%

Satori Botnet Resurfaces & Targets Android Devices

Despite that fact its author has been sent back to jail, the Satori botnet has recently resurfaced and seems to be targeting Android devices, according to a research note from CenturyLink.

The Satori botnet, which has been associated with numerous attacks over the past two years, is proving resilient despite the fact that its main author has been returned to jail in recent days.

After falling virtually silent in late August and early September, when its creator was indicted on federal charges for violating the Computer Fraud and Abuse Act, Satori has resurfaced, according to research from CenturyLink, which posted an October 29 update on the botnet.

CenturyLink research recorded evidence that the botnet's command-and-control (C&C) server being reactivated over the last few weeks with increased Transmission Control Protocol (TCP) bot traffic being directed to that IP address.

"After identifying hosts which were scanning the Internet on port TCP/5555, we could confirm that they were indeed largely from the same infected device pool that existed before the shutdown," according to Monday's blog post.

On September 25, the CenturyLink Threat Research Labs recorded about 9,900 unique IP address attempting to connect to the main control port -- TCP/7000 -- that is associated with the C&C server. Researchers noted that about 57% of all the traffic originated in Tunisia, while another 37% came from the US.

The researchers also noted that a significant volume of this traffic came from Android-based devices, and CenturyLink is notifying network providers about this malicious traffic. Previously, the botnet targeted Internet of Things (IoT) devices.

In an email, Mike Benjamin, the head of CenturyLink Threat Research Labs, noted that Satori, as well as its predecessor -- the Mirai botnet -- have shown the ability to adopt new methods and new attacks over time. For instance, researchers noted several months ago that Satori was being used as part of a crypto mining scheme. (See Satori Botnet Plays Hidden Role in Cryptomining Scheme, Researchers Find.)

"In multiple instances, it was the first Mirai variant to adopt an attack method, and in one case it actually utilized a zero-day exploit," Benjamin told Security Now. "The targeting of the Android debugger service follows this trend, and has recently been employed by a number of malware families, all fighting over control of the same vulnerable footprint. The CenturyLink Threat Labs' research shows how the Satori installer took the time to remove a cryptominer malware upon execution."

Benjamin added that while Satori still retains the ability to launch distributed denial of service (DDoS) attacks, it has not conducted one of these so far.

"It has maintained an ability to launch DDoS attacks throughout its existence, including today," Benjamin added. "The actor's ability to introduce new exploits quickly has on multiple occasions given it a potential attack power, which resulted in immediate action by CenturyLink to block its ability to operate across our global IP network and work quickly with the wider security community to neutralize its ability to attack globally."

Previously, Radware researchers found that Satori had been targeting D-Link routers in an effort to expand its own network. This happened a few months before the creator of the botnet, Kenneth Currin Schuchman, was charged by federal prosecutors. (See Satori Botnet Targeting D-Link Routers in Latest Attack.)

Following his initial arrest in August, Schuchman, who also goes by the name Nexus Zeta and who first used the source code for the Mirai botnet to create the Satori network, was released.

However, according to ZDNet, Schuchman was re-arrested on October 12 for violating the terms of his pre-trial release. It's not clear what conditions he violated.

In his email, Benjamin did not speculate on who might be running Satori with Schuchman in and out of jail over the last several months, but he noted that a botnet of this size is usually too large for one person to oversee by themselves.

"In establishing botnets of this nature, it is not uncommon for actors to work with others to ensure they can grow their footprint quickly and keep it operating at scale," Benjamin wrote. "It is reasonable to assume that the author was working with others on this particular botnet instance."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.