Tuesday, May 8, 2018

Mirai Botnet Attacks Likely Pulled Off By Bored Teenagers

Mirai Botnet Attacks

Image source: http://www.securitynewspaper.com/wp-content/uploads/2016/09/mirai-ddos-trojan-is-the-next-big-threat-for-iot-devices-and-linux-servers-507964-2.png

Mirai Botnet Attacks Likely Pulled Off By Bored Teenagers

The Mirai botnet DDoS attacks were the largest on record and they were likely masterminded by teenagers.

In October, a massive DDoS attack on the Dyn DNS Managed DNS infrastructure brought down a number of major websites, including PayPal, Twitter, Amazon, Netflix, and Spotify. The attack was accomplished through the use of the Mirai botnet, a piece of open source malware that works by compromising Internet of Things (IoT) devices and turning them into zombies. It was the largest DDoS attack in history, and it illustrated the significant vulnerabilities posed by insecure IoT devices.

In the aftermath of the Mirai attacks, cyber security experts went to work to find out who was behind them. Was this the work of foreign or domestic terrorists? Nation-state hackers? Organized crime groups? Turns out, the largest DDoS attack ever recorded was most likely orchestrated not by organized terror groups or criminal masterminds, but teenagers. Vice News reports:

[T]he worlds leading cybersecurity experts have been following clues to track who is responsible. Theyve come to a disturbing conclusion: the biggest DDoS attack in history was probably not caused by a state-sponsored actor, organized crime, terror groups, or anyone with a geopolitical or financial motive. So whos left?

Kids, said Mikko Hypponen, chief research officer with security firm F-Secure. Kids who have the capability and dont know what to do with it.

The source code that was released could have been written by a high school student, a smart high school student, but a high school student nonetheless, security expert Rob Graham said after examining the malware used in the attacks. It wasnt particularly sophisticated.

The notion that a rank amateur could manage to pull off such a massive cyber attack is not unprecedented. In 2008, a Polish teenager hacked into the tram system of the city of Lodz, Poland, derailing four trains and injuring a dozen people. When questioned by authorities, he claimed that the hack was done as a prank.

Anyone can download the source code for Mirai. Its available online, along with helpful, step-by-step instructions. As the recent DDoS attacks prove, it doesnt take a computer science degree, the financial backing of a nation-state or terror group, or much skill to use it. This begs the same question that was asked after the Lodz tram debacle: If a high school kid motivated only by the desire to stir things up a bit can do this much damage, what could an organized, skilled, well-funded group of highly motivated cyber terrorists accomplish?

Insecure IoT Devices No Match for Mirai

The Mirai malware takes advantage of a very simple but extremely serious vulnerability that plagues IoT devices from routers to printers to DVRs: Many, if not most users have never changed the default passwords their devices came with because they dont know how, they dont understand why they should, or both. Even in cases where a security-conscious user realizes they need to change their devices password, they may not be able to; on some devices, the login credentials are hard-coded into the firmware, making it difficult or impossible for end users to change them.

Part of the PCI DSS standards that retailers and credit card processors must follow dictate that no hardware should ever be connected to a network unless its default login credentials have been changed. There are two good reasons for this. First, the majority of data breaches are the result of hackers obtaining legitimate login credentials into a system, and second, manufacturer default passwords are widely available online. The Mirai source code contains 68 user name and password combinations. Since manufacturers often use the same login credentials for multiple devices, just one set could allow a hacker to access hundreds, possibly thousands of devices.

Mirai works by scanning the internet for specific devices, then attempting to access them using manufacturer default credentials. Once Mirai successfully compromises a device, hackers can turn it into a zombie often without the devices owner even realizing it. Once an army of zombie devices has been amassed, it can be used flood specific web servers with so many junk requests that they slow to a crawl or crash.

Mirai DDoS Attacks the Canary in the Coal Mine for IoT Security

In the wake of the Mirai attacks, Chinese manufacturer Hangzhou Xiongmai voluntarily recalled its home webcams, and its possible more manufacturers will follow suit. However, in light of the serious issues raised by Mirai, much more has to be done. The situation is so bad, and IoT manufacturers have dragged their feet for so long, some experts are now calling for the federal government to step in and regulate IoT security.

If IoT manufacturers do not step up to the plate and clean their own houses, they are setting themselves up not only for onerous government regulations but also cyber attacks that are far more destructive than the Mirai DDoS attacks.

Student Procrastination Laziness or Anxiety

Image source: http://bridgenews.files.wordpress.com/2011/05/procrastination.gif Student Procrastination Laziness or Anxiety Procrastinat...