Share This Article
A massive cyber attack performed through hijacked Internet of Things devices led to the collapse of a large portion of the Internet.
As part of the series of guest posts named Thoughts Leadersโ Corner, here is a very interesting article from Pierluigi Paganiniย who is one of the most well know experts of cybercrime in the world. And he definitely is the best suited person to discuss about the cyber attack against the Internet performed by means of IoT devices.ย I hope you will enjoy it!
* ย ย ย ย ย * ย ย ย ย ย *
What cyber attack happened?
On 21 October 2016, a massive DDoS attack targeted the DNS service of Dyn,ย one of the most authoritativeย domain name system (DNS) provider, caused an extended Internetย outage. A large portion of US Internet users was not able to reach most important web services as many websites, including Twitter, GitHub, PayPal, Amazon, Reddit, Netflix, and Spotify, were down.
After this event, users have probably understood that the Internet architecture is a resource that could be targeted by hackers with serious and unpredictable consequences.
But how Internet of Things devices were used for the attack?
We still ignore the exact dynamic of the attack, the unique certainty is that the Dyn DNS Service was flooded by a devastating wave of requests originated by million of compromised IoT devices. Dyn reported a huge army of hijacked Internet of Things devices could be abused by attackers to power the massive DDoS attack.
NewWorldHackersย & Anonymous powered the massive DDoS attack.ย WikiLeaks confirmed that its supporters launched the massive DDoS attack to protest against the decisionย of the Ecuadorian governmentโs to cut off the Internet connection of the WikiLeaks founder Julian Assangeย due to the US Political election leaks.
The security intelligence firm Flashpointย published an interesting post on the massive DDoS in which confirm that its experts have observed the Mirai bots driving the attack against DynDNS.
“Flashpoint has confirmed that some of the infrastructure responsible for the distributed denial-of-service (DDoS) attacks against Dyn DNS were botnets compromised by Mirai malware. Mirai botnets were previously used in DDoS attacks against security researcher Brian Krebsโ blog โKrebs On Securityโ and French internet service and hosting provider OVH.โ reads the analysis published by Flashpointย โMirai malware targets Internet of Things (IoT) devices like routers, digital video records (DVRs), and webcams/security cameras, enslaving vast numbers of these devices into a botnet, which is then used to conduct DDoS attacks.“
Below the Key Findings of the report published by Flashpoint
- Flashpoint has confirmed that some of the infrastructure responsible for the distributed denial-of-service (DDoS) attacks against Dyn DNS were botnets compromised by Mirai malware.
- Mirai botnets were previously used in DDoS attacks against the โKrebs On Securityโ blog and OVH.
- As of 1730 EST, the attacks against Dyn DNS are still ongoing. Flashpoint is coordinating with multiple vendors and law enforcement to track the infected devices that constitute the botnet being used to conduct these attacks.
This is not surprising if we consider that the source code of the botnet was leaked from the popular criminal hacker forum Hackforum in earlier October 2016 through a user whose moniker is “Anna-senpai” that shared the link to the source code of the malware “Mirai.”
โThe leak of the source code was announcedย Friday on the English-language hackingย community Hackforums. The malware, dubbed โMiraiโย spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.โ reported Krebs.
The Mirai Botnet was first spotted by the researcher MalwareMustDieย this summer 2016 targeting connected Internet of Things devices as such botnet targets mainly objects such as routers, CCTV, and DVRs.
The Mirai malware targeted Internet of Things devices using the credential factory settings, a circumstance that is quite common in the wild.
The availability of the source code of Mirai Botnetย in the wild theoretically made possible everyone to power a botnet.
I confess you that I believe the leak of theย source code of such kind of botnet could be also part of a wider strategy of a certain category of attackers that intend to power massive attacks making impossible the attribution.
Watch out! The Mirai botnet that powered the attack against the Dyn DNS service is not the same used againstย Krebsโs site and OVH.
“While Flashpoint has confirmed that Mirai botnets were used in the October 21, 2016 attack against Dyn, they were separate and distinct botnets from those used to execute the DDoS attacks against โKrebs on Securityโ and OVH. Earlier this month, โAnna_Senpai,โ the hacker operating the large Mirai botnet used in the Krebs DDoS, released Miraโs source code online.โ continues Flashpoint โSince this release, copycat hackers have used the malware to create botnets of their own in order to launch DDoS attacks.“
It is unknown if the attacks against Dyn DNS are linked to the DDoS attacks against Krebs, OVH, or other previous attacks.
The attack against a DNS aims at obtaining a wide effect, in the specific case many sites and services are using Syn as their upstream DNS provider.
If you are interested to know more about the diffusion of the Mirai Botnet, you can useย thisย online trackerย that reports more than 1.2 Million IPs seen associated to devices infected by the Mirai code in the wild. Consider that isnโt the exact number of infected devices, because many of them use dynamic IPs.
According to theย Reuters, the US Department of Homeland Security (DHS) and the FBI are both investigating the massive DDoS attacks against the Dyn DNS service.
We have no indication about the possible culprit, I personally believe that the leakage of the Mirai botnet in the wild and this last massive attack have something in common and there is a specific strategy of a persistent attacker behind the events.
If you found this article interesting, please share it on your favourite social media. And for more discussions around the topic, you can follow Pierluigi Paganini on his LinkedIn and Twitter profiles and on his blog Security Affairs.ย Also, if you want to contribute to the Thought Leadersโ Corner, here are the guidelines for guest posts.