头孢过敏什么症状| 凤梨不能和什么一起吃| 清明节的习俗是什么| 肺气肿是什么| 房产证和土地证有什么区别| 类风湿关节炎吃什么药| 吃秋葵有什么好处| 僵尸为什么怕糯米| 脑死亡是什么原因引起的| 青少年嗜睡是什么原因| 广州立冬吃什么| 伏地魔是什么意思| 腱鞘炎是什么原因引起的| 32周孕检检查什么项目| 查输卵管通不通做什么检查| 甲减吃什么| 什么的迎春花| 全麦面包是什么做的| 乳腺增生是什么症状| 阴茎硬度不够吃什么好| 相形见拙什么意思| 睡着后抽搐抖动是什么| 晚上睡觉手麻是什么原因| 蒲公英吃了有什么好处| 78年属什么生肖| 皮炎是什么原因引起的| 黑茶色是什么颜色| 查乳房挂什么科| 为什么夏天容易拉肚子| 吃什么能胖起来| 两岁宝宝坐飞机需要什么证件| 1999年属兔是什么命| 草字头加叔念什么| 排卵期身体有什么症状表现吗| 鹿晗的粉丝名叫什么| 吃什么水果对肠胃好| 病毒性咽喉炎吃什么药| 油压是什么意思| longines是什么牌子| 总流鼻血是什么原因| 糖尿病什么原因引起的| hpv检查什么项目| AB型血型有什么优势| 右脚浮肿预示着什么| 吃什么对心脏好| 激素6项检查是些什么| 褒姒是什么意思| 阴道瘙痒是什么原因| 小腿前面的骨头叫什么| 维生素c什么时候吃| 低压108有什么危险| 清华校长什么级别| her2是什么意思| 月德合是什么意思| 体内湿气太重吃什么药能快速除湿| 生僻字什么意思| 减肥期间晚上吃什么| 牙齿里面疼是什么原因| mice是什么意思| 腺肌症是什么原因引起的| 七月11日是什么星座| 什么人不能吃黄精| 特种兵是什么兵种| 什么叫地包天| 什么时候打胎对身体伤害最小| 无疾而终是什么意思| 强直性脊柱炎挂什么科| 红醋是什么醋| 喝酒前吃什么保护胃| edd是什么意思| 经常头疼挂什么科| 打是什么意思| 墨菲定律什么意思| 辅弼是什么意思| 今天属什么生肖日历| 午餐肉是什么肉做的| 甲硝唑治什么病| 什么是泥炭土| 气什么意思| 乳腺导管扩张是什么意思严重吗| 钯金是什么金| 雷诺综合症是什么病| 低密度脂蛋白胆固醇偏低是什么意思| 双侧肾盂无分离是什么意思| 飒的意思是什么| 早上九点到十点是什么时辰| 生殖器疱疹用什么药| qn是什么意思| 湖北有什么山| 六月初二是什么星座| 肌瘤和囊肿有什么区别| 王属什么五行| 神经病和精神病有什么区别| 上火吃什么| 角化型脚气用什么药最好| 尿液分析是检查什么| 霉菌反复发作是什么原因| 嗓子发干是什么原因| 甲状腺球蛋白抗体低说明什么| 宵字五行属什么| 补办身份证需要带什么| 冉字五行属什么| 拔掉智齿有什么影响| 什么是白带| 男人吃叶酸片有什么好处| 心脏早搏有什么危害| 什么人不能吃蚕豆| 棱是什么| 智障是什么意思| 白色糠疹用什么药膏| 器质性心脏病是什么意思| 属牛配什么属相最好| 农历七月初七俗称什么| 济公叫什么名字| 前门大街有什么好玩的| 十面埋伏是什么生肖| 对酒当歌是什么生肖| 上火流鼻血吃什么降火| 硬性要求是什么意思| 子宫有积液是什么原因引起的| 什么药可以溶解血栓| 降压药什么时候吃好| 电动车是什么电池| 想吃甜食是身体缺什么| 燕窝是什么东西做成的| 梦见吃鸡蛋是什么意思| 土命是什么意思| 戒烟为什么会长胖| 用什么补肾最好| 颈椎病用什么枕头最好| 甘油三酯是什么| 召力念什么| 最大的淡水湖是什么湖| 兰蔻是什么品牌| 梦见打篮球是什么意思| 甲亢都有什么症状| 梦见芝麻是什么意思| 女人梦到小蛇什么预兆| 1893年属什么生肖| 王五行属性是什么| 寅时是什么时间| 长期口腔溃疡挂什么科| 錾是什么意思| 脾胃虚寒吃什么水果好| 颈椎病吃什么药效果好| 安慰什么意思| 李隆基是李世民的什么人| 提前来大姨妈是什么原因| 15年婚姻是什么婚| 屁股抽筋疼是什么原因| 新生儿满月打什么疫苗| 自主能力是什么意思| 黥面是什么意思| 尿检挂什么科| 高反吃什么药| 上呼吸道感染吃什么消炎药| lagogo是什么牌子| 祥云是什么意思| 车迟国的三个妖怪分别是什么| 中秋节干什么| 刺梨根泡酒有什么功效| 又什么又什么| 7月4号是什么星座| 酸奶不能和什么一起吃| 肌酐高有什么危害| 喝椰子汁有什么好处| 来例假喝什么好| 咳嗽能吃什么食物| 胎心胎芽最晚什么时候出现| 中性粒细胞百分比高是什么原因| coach是什么牌子的包| 车前草治什么病最好| 农历八月十五是什么节| kohler是什么品牌| 闲聊是什么意思| 嘴唇起泡用什么药| 总是感觉口渴是什么原因| 非萎缩性胃炎什么意思| 四个一是什么| 尿胆原高是什么原因| ph值高是什么原因| 小肚子疼挂什么科| 霉菌性炎症用什么药效果最好| 棒棒糖是什么意思| 利益最大化是什么意思| 肾积水是什么原因造成的怎么治疗| 甲状腺桥本是什么意思| 卵巢囊性结构是什么意思| 吃什么可以去脂肪肝| 下发是什么意思| 什么情况下要打狂犬疫苗| 欣字属于五行属什么| 藤原拓海开的什么车| 火旺是什么意思| fed是什么意思| 乳腺结节吃什么药| 水土不服吃什么药管用| 建档立卡是什么| 脂肪垫是什么| 气血亏虚吃什么中成药| 什么是条件兵| 束在什么情况下读su| 失眠多梦是什么原因| 液基细胞学检查是什么| 什么的松果| 7月4日什么星座| 蛋白质是什么食物| 百折不挠指什么生肖| 犹怜是什么意思| 10月出生是什么星座| 鱼什么而什么| 身上长白点是什么原因| 耳朵疼痛吃什么药| 抗衡是什么意思| 男龙和什么生肖最配| mm是什么病| 轩尼诗是什么酒| 网盘是什么东西| 铁蛋白高吃什么食物好| 摆地摊卖什么最赚钱而且很受欢迎| 非文念什么| 火乐读什么| 没什么打什么| 中联办是什么级别| 什么是植物神经| 什么药可以溶解血栓| 许嵩的粉丝叫什么| 房早有什么危害| 砒霜是什么| 婷婷玉立什么意思| 阿米巴是什么意思| 扁桃体肥大是什么原因造成的| 漏尿吃什么药| 法国铁塔叫什么名字| 嘴唇是紫色的是什么原因| 胰腺在人体什么位置| 阿托伐他汀治什么病| 眉心长痘痘什么原因| 溺爱的意思是什么| 晚上剪指甲有什么说法| 肉偿是什么意思| vivo手机是什么牌子| 孕妇睡觉流口水是什么原因| 做梦人死了是什么征兆| 眉头下方有痣代表什么| 大云是什么| 手脚麻木是什么原因引起的| 办理结婚证需要什么材料| 眉毛白了是什么原因引起的| 加味逍遥丸和逍遥丸有什么区别| 头晕恶心呕吐是什么原因| 斑是什么原因造成的| 孩子流口水是什么原因引起的| 宝宝风热感冒吃什么药| 最贵的烟是什么| 肩袖损伤吃什么药| 疾控中心是做什么的| 平板电脑与笔记本电脑有什么区别| 前位子宫是什么意思| 血糖看什么指标| 四十年婚姻是什么婚| 老公的爸爸称谓是什么| candies什么意思| 洗银首饰用什么清洗| 百度

大师用车|低劣品多 你所不知道的汽车装饰品的

百度 克林顿让中国加入世贸平心而论对中国经济非常有好处,也受到美国资本家的欢迎。

The Mirai malware exploits security holes in IoT devices, and has the potential to harness the collective power of millions of IoT devices into botnets, and launch attacks.

Learning Objectives

After reading this article you will be able to:

  • Learn about the Mirai botnet
  • Learn how botnets are mutating
  • Learn why botnets are dangerous
  • Learn how IoT devices and botnets are related

Related Content


Want to keep learning?

Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!

Refer to Cloudflare's Privacy Policy to learn how we collect and process your personal data.

Copy article link

What is Mirai?

Mirai is malware that infects smart devices that run on ARC processors, turning them into a network of remotely controlled bots or "zombies". This network of bots, called a botnet, is often used to launch DDoS attacks.

Botnet - networked malicious bots

Malware, short for malicious software, is an umbrella term that includes computer worms, viruses, Trojan horses, rootkits and spyware.

In September 2016, the authors of the Mirai malware launched a DDoS attack on the website of a well-known security expert. A week later they released the source code into the world, possibly in an attempt to hide the origins of that attack. This code was quickly replicated by other cybercriminals, and is believed to be behind the massive attack that brought down the domain registration services provider, Dyn, in October 2016.

How does Mirai work?

Mirai scans the Internet for IoT devices that run on the ARC processor. This processor runs a stripped-down version of the Linux operating system. If the default username-and-password combo is not changed, Mirai is able to log into the device and infect it.

IoT, short for Internet of Things, is just a fancy term for smart devices that can connect to the Internet. These devices can be baby monitors, vehicles, network routers, agricultural devices, medical devices, environmental monitoring devices, home appliances, DVRs, CC cameras, headset, or smoke detectors.

The Mirai botnet employed a hundred thousand hijacked IoT devices to bring down Dyn.

Who were the creators of the Mirai botnet?

Twenty-one-year-old Paras Jha and twenty-year-old Josiah White co-founded Protraf Solutions, a company offering mitigation services for DDoS attacks. Theirs was a classic case of racketeering: Their business offered DDoS mitigation services to the very organizations their malware attacked.

Why does the Mirai malware remain dangerous?

The Mirai is mutating.

Though its original creators have been caught, their source code lives on. It has given birth to variants such as the Okiru, the Satori, the Masuta and the PureMasuta. The PureMasuta, for example, is able to weaponize the HNAP bug in D-Link devices. The OMG strain, on the other hand, transforms IoT devices into proxies that allow cybercriminals to remain anonymous.

There is also the recently discovered - and powerful - botnet, variously nicknamed IoTrooper and Reaper, which is able to compromise IoT devices at a much faster rate than Mirai. The Reaper is able to target a larger number of device makers, and has far greater control over its bots.

What are the various botnet models?

Centralized botnets

If you think of a botnet as a theatrical play, the C&C (Command and Control Server, also known as the C2) server is its director. The actors in this play are the various bots that have been compromised by malware infection, and made part of the botnet.

When the malware infects a device, the bot send out timed signals to inform the C&C that it now exists. This connection session is kept open till the C&C is ready to command the bot to do its bidding, which can include sending out spam, password cracking, DDoS attacks, etc.

In a centralized botnet, the C&C is able to convey commands directly to the bots. However, the C&C is also a single point of failure: If taken down, the botnet becomes ineffective.

Tiered C&Cs

Botnet control may be organized in multiple tiers, with multiple C&Cs. Groups of dedicated servers may be designated for a specific purpose, for example, to organize the bots into subgroups, to deliver designated content, and so on. This makes the botnet harder to take down.

Decentralized botnets

Peer-to-peer (P2P) botnets are the next generation of botnets. Rather than communicate with a centralized server, P2P bots act as both a command server, and a client which receives commands. This avoids the single point of failure problem inherent to centralized botnets. Because P2P botnets operate without a C&C, they are harder to shut down. Trojan.Peacomm and Stormnet are examples of malware behind P2P botnets.

How does malware turn IoT devices into bots or zombies?

In general, email phishing is a demonstrably effective way of infecting the computer - the victim is tricked into either clicking a link that points to a malicious website, or downloading infected attachment. Many times the malicious code is written in such a way that common antivirus software is not able to detect it.

In the case of Mirai, the user doesn’t need to do much beyond leaving the default username and password on a newly installed device unchanged.

What is the connection between Mirai and click fraud?

Pay-per-click (PPC), also known as cost-per-click (CPC), is a form of online advertising in which a company pays a website to host their advertisement. Payment depends on how many of that site’s visitors clicked on that ad.

When CPC data is fraudulently manipulated, it is known as click fraud. This can be done by having people manually click on the ad, by use of automated software, or with bots. Through this process, fraudulent profits can be generated for the website at the expense of the company placing those ads.

The original authors of Mirai were convicted for leasing their botnet out for DDoS attacks and click fraud.

Why are botnets dangerous?

Botnets have the potential to impact virtually every aspect of a person’s life, whether or not they use IoT devices, or even the Internet. Botnets can:

  • Attack ISPs, sometimes resulting in denial-of-service to legitimate traffic
  • Send spam email
  • Launch DDoS attacks and bring down websites and APIs
  • Perform click fraud
  • Solve weak CAPTCHA challenges on websites in order to imitate human behavior during logins
  • Steal credit card information
  • Hold companies to ransom with threats of DDoS attacks

Why is botnet proliferation so hard to contain?

There are many reasons why it is so difficult to stop the proliferation of botnets:

IoT device owners

There is no cost or interruption in service, so there is no incentive to secure the smart device.

Infected systems may be cleaned out with a reboot, but since scanning for potential bots happens at a constant rate, it’s possible for them to be reinfected within minutes of the reboot. This means users have to change the default password immediately after reboot. Or they must prevent the device from accessing the Internet until they can reset the firmware, and change the password offline. Most device owners have neither the know-how, nor the motivation to do so.

ISPs

The increased traffic on their network from the infected device typically does not compare to the traffic that media streaming generates, so there is not much incentive to care.

Device manufacturers

There is little incentive for device manufacturers to invest in the security of low-cost devices. Holding them liable for attacks might be one way of forcing change, though this might not work in regions with lax enforcement.

Ignoring device security comes at great peril: Mirai, for example, is able to disable anti-virus software, which makes detection a challenge.

Magnitude

With over a billion-and-a-half ARC-processor-based devices flooding the market each year, the sheer number of devices that can be conscripted into powerful botnets means that these malware variants have grown in possible impact.

Simplicity

Ready-to-go botnet kits obviate the need for tech savvy. For $14.99-$19.99, a botnet may be leased for an entire month. Refer to What is a DDoS Booter/Stresser? for more details.

Global IoT Security Standards

There is no global entity, or consensus, to define and enforce IoT security standards.

While security patches are available for some devices, users might not have the skill, or the incentive, to update. Many manufacturers of low-end devices don’t offer any kind of maintenance at all. For ones that do, it is often not long term. There is also no way to decommission devices once the updates are no longer maintained, making them indefinitely unsecure.

Global Law Enforcement

The difficulty in tracking down and prosecuting botnet creators makes the containment of botnet proliferation difficult; There is no global Interpol-equivalent (International Criminal Police Organization) for cybercrime, with corresponding investigative skills. Law enforcement across the globe is commonly not been able to keep up with cybercriminals when it comes to latest technology.

Many botnets now employ a DNS technique called Fast Flux in order to hide the domains they use to download malware, or to host phishing sites. This makes them extremely hard to track, and take down.

Does botnet infection degrade performance for IoT devices?

It might. Every once in a while, infected devices might perform sluggishly, but they mostly work as intended. Owners have no great motivation to find ways to clear out the infection.

Addendum

A legislation on the desk of California governor, Jerry Brown, requires that IoT devices have reasonable security feature(s) “appropriate to the nature and function of the device.” This would come into effect in January 2020.

Why this legislation is so important? The lucrative California market makes it impossible for companies to ignore. If they want to sell in California, they will need to improve security in their devices. This will benefit all states.

什么药可以减肥瘦身 胃胀胃不舒服吃什么药 置之不理的置是什么意思 关灯吃面什么意思 蓄谋已久什么意思
什么原因导致子宫内膜息肉 梦见水果是什么意思 心阴不足吃什么中成药 有才是什么意思 釉面是什么意思
睡觉起来脸肿是什么原因引起的 淋巴细胞百分比偏低是什么意思 错构瘤是什么意思 螳螂捕蝉什么意思 舌头白吃什么药
毛肚是什么部位 壁细胞主要分泌什么 口苦吃什么药最有效 什么药止咳最好 1934年属什么生肖
新生儿前面头发稀少是什么原因hcv9jop0ns7r.cn 助听器什么品牌最好hcv8jop8ns8r.cn 什么分明xjhesheng.com 金匮肾气丸有什么功效hcv8jop9ns5r.cn 禾五行属什么hcv9jop2ns9r.cn
中药什么时间喝效果最好hcv9jop8ns3r.cn 25周岁属什么生肖hcv8jop7ns4r.cn 毛囊炎是什么症状图片hcv9jop7ns1r.cn 请问支气管炎吃什么药最有效hcv7jop9ns2r.cn 头发变黄是什么原因hcv8jop8ns3r.cn
扁桃体肥大是什么原因造成的hcv8jop6ns9r.cn 小手指麻木是什么原因hcv8jop0ns9r.cn 泡酒用什么酒好hcv9jop5ns1r.cn 心脏变大是什么原因hcv9jop7ns3r.cn 鼻子两侧挤出来的白色东西是什么hcv8jop2ns3r.cn
薛之谦的真名叫什么hcv9jop7ns1r.cn 什么是朱砂hcv9jop2ns9r.cn super star是什么意思hcv8jop7ns5r.cn 天秤座女和什么星座最配hcv9jop3ns1r.cn 心悸是什么意思hcv8jop3ns4r.cn
百度