sb-nz logo
Story image

IoT devices creating massive DDoS botnets

30 Sep 2016

Over the last two weeks, two of the largest DDoS attack ever recorded have been executed against security journalist Brian Krebs and France-based hosting provider OVH. The two attacks, which hit their targets with over 600Mbps and 1Tbps of traffic respectively, did not only use PCs recruited by malware infections – the traditional tool used by threat actors.

Vulnerable IoT devices such as routers, PVRs, thermostats, refrigerators and cameras are now targeted by the bad guys as they are often poorly secured and easy to exploit.

The writing has been on the wall for some time. A couple of years ago, released a directory of publicly accessible webcams – many of which were set up in people’s homes and used either no security or default passwords. Although private cameras have been removed from their directory, it showed that many devices were vulnerable.

A report by SEC Consult that looked at 4,000 embedded devices from 70 different hardware vendors discovered that over 580 unique private cryptographic keys for SSH and HTTPS are re-shared between multiple devices from the same vendor and even from the different vendors.

In other words, once you crack the password on one device, you potentially have access to thousands of others. was attacked last week and indications are the attack was launched with the help of a botnet that enslaved a large number of hacked IoT devices. Source code for malware that can use IoT devices has been around for several months and goes by names such as Lizkebab, BASHLITE, Torlus and gafgyt.

The more recent attack on OVH used in excess of 150,000 IoT devices according to the company’s founder and CEO Octave Klaba. That wasn’t all concentrated in one attack. Rather, there were several concurrent attacks of varying sizes with one attack peaking at almost 800Mbps, setting the record for a single DDoS attack.

Depending on the source, estimates suggest that there will be anywhere between 20 billion and 50 billion IoT devices connected to the Internet by the end of this decade. Research from IDC has found 38% of organisations have already launched IoT solutions with another 46% planning to deploy IoT solutions in the next year. Those devices will vary in sophistication from simple sensors that collect and send specific data, to devices that control other devices.

The challenge for device makers is making the devices secure while maintaining low costs. The expectation for many IoT devices that cost just a few cents to manufacture to embed some form of end-point security may not be reasonable.

When it comes to protecting the devices on your network so they can’t be hacked and used in IoT botnets, it’s critical that all default passwords are changed and the devices are appropriately isolated from other systems so they don’t provide a gateway for hackers. It is possible for hackers who access an IoT device to move laterally through other systems once they access the network.

As many IoT devices can’t run any sort of end-point protection, appropriate network monitoring is needed to detect any unexpected network activity emanating from those devices.

Frank Wiener, from Wedge Networks, says “The way you think about securing those devices is if you have a device that has very limited functionality, there are very limited numbers of commands and communications that should be going to and coming from that device. So by inspecting it at the network layer where you're seeing the packets that are going in the content of the communications going on, you can ask the question of is this an appropriate communication or action associated with this device and limit the types of communications and activities to try to control that”.

Now that there have been some high profile attacks using IoT devices, it’s likely we will see the security turn some attention to how threat actors are exploiting weaknesses in IoT devices. However, the proliferation of devices and lack of specific attention given to this new attack vector ensures these attacks won’t be the last ones we hear of.

Story image
22 billion records exposed from breaches in 2020 — report
The research also found that 35% of the breaches recorded by Tenable were caused by ransomware attacks, while 14% of breaches stemmed from email compromises.More
Story image
Online gaming a 'hotbed' for DDoS attacks — report
The latency and availability issues present in online gaming, in particular, presented an attractive target to attackers, in addition to the enduring popularity of gaming in the era of COVID-19.More
Story image
Dark net vendors wanting Bitcoin payments for unverified COVID-19 vaccines
As the medicines are being offered on the dark net, purchasers have no way of knowing whether they are genuine, according to Check Point.More
Story image
Huawei: Corporates must focus on data minimisation and business continuity to mitigate data security challenges
"From a long-term sustainable point of view, organisations will need to adopt data minimisation and privacy by design and default."More
Story image
Red Hat to acquire Kubernetes-native security provider StackRox
Red Hat will further expand its security offering, adding StackRox's complementary capabilities to strengthen integrated security across its open hybrid cloud portfolio.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More