A massive cyber attack performed through hijacked Internet of Things devices led to the collapse of a large portion of the Internet.
As part of the series of guest posts named Thoughts Leaders’ Corner, here is a very interesting article from Pierluigi Paganini who is one of the most well know experts of cybercrime in the world. And he definitely is the best suited person to discuss about the cyber attack against the Internet performed by means of IoT devices. I hope you will enjoy it!
* * *
What cyber attack happened?
On 21 October 2016, a massive DDoS attack targeted the DNS service of Dyn, one of the most authoritative domain name system (DNS) provider, caused an extended Internet outage. A large portion of US Internet users was not able to reach most important web services as many websites, including Twitter, GitHub, PayPal, Amazon, Reddit, Netflix, and Spotify, were down.
After this event, users have probably understood that the Internet architecture is a resource that could be targeted by hackers with serious and unpredictable consequences.
But how Internet of Things devices were used for the attack?
We still ignore the exact dynamic of the attack, the unique certainty is that the Dyn DNS Service was flooded by a devastating wave of requests originated by million of compromised IoT devices. Dyn reported a huge army of hijacked Internet of Things devices could be abused by attackers to power the massive DDoS attack.
NewWorldHackers & Anonymous powered the massive DDoS attack. WikiLeaks confirmed that its supporters launched the massive DDoS attack to protest against the decision of the Ecuadorian government’s to cut off the Internet connection of the WikiLeaks founder Julian Assange due to the US Political election leaks.
The security intelligence firm Flashpoint published an interesting post on the massive DDoS in which confirm that its experts have observed the Mirai bots driving the attack against DynDNS.
“Flashpoint has confirmed that some of the infrastructure responsible for the distributed denial-of-service (DDoS) attacks against Dyn DNS were botnets compromised by Mirai malware. Mirai botnets were previously used in DDoS attacks against security researcher Brian Krebs’ blog “Krebs On Security” and French internet service and hosting provider OVH.” reads the analysis published by Flashpoint “Mirai malware targets Internet of Things (IoT) devices like routers, digital video records (DVRs), and webcams/security cameras, enslaving vast numbers of these devices into a botnet, which is then used to conduct DDoS attacks.“
Below the Key Findings of the report published by Flashpoint
- Flashpoint has confirmed that some of the infrastructure responsible for the distributed denial-of-service (DDoS) attacks against Dyn DNS were botnets compromised by Mirai malware.
- Mirai botnets were previously used in DDoS attacks against the “Krebs On Security” blog and OVH.
- As of 1730 EST, the attacks against Dyn DNS are still ongoing. Flashpoint is coordinating with multiple vendors and law enforcement to track the infected devices that constitute the botnet being used to conduct these attacks.
This is not surprising if we consider that the source code of the botnet was leaked from the popular criminal hacker forum Hackforum in earlier October 2016 through a user whose moniker is “Anna-senpai” that shared the link to the source code of the malware “Mirai.”
“The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed ‘Mirai’ spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.” reported Krebs.
The Mirai Botnet was first spotted by the researcher MalwareMustDie this summer 2016 targeting connected Internet of Things devices as such botnet targets mainly objects such as routers, CCTV, and DVRs.
The Mirai malware targeted Internet of Things devices using the credential factory settings, a circumstance that is quite common in the wild.
The availability of the source code of Mirai Botnet in the wild theoretically made possible everyone to power a botnet.
I confess you that I believe the leak of the source code of such kind of botnet could be also part of a wider strategy of a certain category of attackers that intend to power massive attacks making impossible the attribution.
Watch out! The Mirai botnet that powered the attack against the Dyn DNS service is not the same used against Krebs’s site and OVH.
“While Flashpoint has confirmed that Mirai botnets were used in the October 21, 2016 attack against Dyn, they were separate and distinct botnets from those used to execute the DDoS attacks against “Krebs on Security” and OVH. Earlier this month, “Anna_Senpai,” the hacker operating the large Mirai botnet used in the Krebs DDoS, released Mira’s source code online.” continues Flashpoint “Since this release, copycat hackers have used the malware to create botnets of their own in order to launch DDoS attacks.“
It is unknown if the attacks against Dyn DNS are linked to the DDoS attacks against Krebs, OVH, or other previous attacks.
The attack against a DNS aims at obtaining a wide effect, in the specific case many sites and services are using Syn as their upstream DNS provider.
If you are interested to know more about the diffusion of the Mirai Botnet, you can use this online tracker that reports more than 1.2 Million IPs seen associated to devices infected by the Mirai code in the wild. Consider that isn’t the exact number of infected devices, because many of them use dynamic IPs.
According to the Reuters, the US Department of Homeland Security (DHS) and the FBI are both investigating the massive DDoS attacks against the Dyn DNS service.
We have no indication about the possible culprit, I personally believe that the leakage of the Mirai botnet in the wild and this last massive attack have something in common and there is a specific strategy of a persistent attacker behind the events.
If you found this article interesting, please share it on your favourite social media. And for more discussions around the topic, you can follow Pierluigi Paganini on his LinkedIn and Twitter profiles and on his blog Security Affairs. Also, if you want to contribute to the Thought Leaders’ Corner, here are the guidelines for guest posts.