{"id":10019,"date":"2017-10-20T14:45:03","date_gmt":"2017-10-20T22:45:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/20\/news-3792\/"},"modified":"2017-10-20T14:45:03","modified_gmt":"2017-10-20T22:45:03","slug":"news-3792","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/20\/news-3792\/","title":{"rendered":"The Reaper Botnet Could Be Worse Than the Internet-Shaking Mirai Ever Was"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59ea6cf8ce22fd0cca3c52bb\/master\/pass\/Botnet-FINAL-843353850.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Fri, 20 Oct 2017 21:45:34 +0000<\/strong><\/p>\n<p data-reactid=\"247\"><span class=\"lede\" data-reactid=\"248\">The Mirai botnet, <\/span><!-- react-text: 249 -->a collection of hijacked gadgets whose cyberattack <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2016\/10\/internet-outage-ddos-dns-dyn\/\" data-reactid=\"250\">made much of the internet inaccessible<\/a><!-- react-text: 251 --> in parts of the US and beyond a year ago, previewed a dreary future of zombie connected-device armies run amuck. But in some ways, Mirai was relatively simple\u2014especially compared to a new botnet that&#x27;s brewing.<!-- \/react-text --><\/p>\n<p data-reactid=\"252\"><!-- react-text: 253 -->While Mirai caused widespread outages, it <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2016\/10\/internet-outage-webcam-dvr-botnet\/\" data-reactid=\"254\">impacted IP cameras and internet routers<\/a><!-- react-text: 255 --> by simply exploiting their weak or default passwords. The latest botnet threat, known as alternately as IoT Troop or Reaper, has evolved that strategy, using actual software-hacking techniques to break into devices instead. It&#x27;s the difference between checking for open doors and actively picking locks\u2014and it\u2019s already enveloped devices on a million networks and counting.<!-- \/react-text --><\/p>\n<p data-reactid=\"256\"><!-- react-text: 257 -->On Friday, researchers at the <!-- \/react-text --><a href=\"http:\/\/blog.netlab.360.com\/iot_reaper-a-rappid-spreading-new-iot-botnet-en\/\" target=\"_blank\" data-reactid=\"258\">Chinese security firm Qihoo 360<\/a><!-- react-text: 259 --> and the <!-- \/react-text --><a href=\"https:\/\/research.checkpoint.com\/new-iot-botnet-storm-coming\/\" target=\"_blank\" data-reactid=\"260\">Israeli firm Check Point detailed<\/a><!-- react-text: 261 --> the new IoT botnet, which builds on portions of Mirai\u2019s code, but with a key difference: Instead of merely guessing the passwords of the devices it infects, it uses known security flaws in the code of those insecure machines, hacking in with an array of compromise tools and then spreading itself further. And while Reaper hasn\u2019t been used for the kind of distributed denial of service attacks that Mirai and its successors have launched, that improved arsenal of features could potentially allow it to become even larger\u2014and more dangerous\u2014than Mirai ever was.<!-- \/react-text --><\/p>\n<p data-reactid=\"262\">\u201cThe main differentiator here is that while Mirai was only exploiting devices with default credentials, this new botnet is exploiting numerous vulnerabilities in different IoT devices. The potential here is even bigger than what Mirai had,\u201d says Maya Horowitz, the manager of Check Point\u2019s research team. \u201cWith this version it\u2019s much easier to recruit into this army of devices.\u201d<\/p>\n<p data-reactid=\"263\"><!-- react-text: 264 -->The Reaper malware has pulled together a grab-bag of IoT hacking techniques that include nine attacks affecting routers from D-Link, Netgear, and Linksys, as well as internet-connected surveillance cameras, including those sold by companies like Vacron, GoAhead, and AVTech. While many of those devices have patches available, most consumers <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/krack-wi-fi-iot-security-broken\/\" data-reactid=\"265\">aren\u2019t in the habit of patching their home network router<\/a><!-- react-text: 266 -->, not to mention their surveillance camera systems.<!-- \/react-text --><\/p>\n<p data-reactid=\"271\">&#x27;With this version it\u2019s much easier to recruit into this army of devices.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\" data-reactid=\"272\">Maya Horowitz, Check Point<\/p>\n<p data-reactid=\"273\">Check Point has found that fully 60 percent of the networks it tracks have been infected with the Reaper malware. And while Qihoo 360&#x27;s researchers write that some 10,000 devices in the botnet communicate daily with the command-and-control server the hackers control, they&#x27;ve found that millions of devices are &quot;queued&quot; in the hackers&#x27; code, waiting for a piece of automatic &quot;loader&quot; software to add them to the botnet.<\/p>\n<p data-reactid=\"274\"><!-- react-text: 275 -->Check Point\u2019s Horowitz suggests anyone who fears that their device might be compromised should check the company\u2019s <!-- \/react-text --><a href=\"https:\/\/research.checkpoint.com\/new-iot-botnet-storm-coming\/\" target=\"_blank\" data-reactid=\"276\">list of affected gadgets<\/a><!-- react-text: 277 -->. An analysis of the IP traffic from those devices should reveal if they\u2019re communicating with the command-and-control server helmed by the unknown hacker that&#x27;s administering the botnet, Horowitz says. But most consumers don&#x27;t have the means to do that network analysis. She suggests that if your device is on Check Point&#x27;s list, you should update it regardless, or even perform a factory reset on its firmware, which she says will wipe the malware.<!-- \/react-text --><\/p>\n<p data-reactid=\"278\"><!-- react-text: 279 -->As usual, though, it&#x27;s not the owners of the infected machines who will pay the real price for allowing Reaper to persist and grow. Instead, the victims would be the potential targets of that botnet once its owner unleashes its full DDoS firepower. In the case of Reaper, the potentially millions of machines it&#x27;s amassing could be a serious threat: Mirai, which McAfee measured as having infected 2.5 million devices at the end of 2016, was able to use those devices to bombard the DNS provider Dyn with junk traffic that <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2016\/10\/internet-outage-ddos-dns-dyn\/\" data-reactid=\"280\">wiped major targets off the face of the internet in October of last year<\/a><!-- react-text: 281 -->, including Spotify, Reddit, and <!-- \/react-text --><em data-reactid=\"282\">The New York Times<\/em><!-- react-text: 283 -->.<!-- \/react-text --><\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"296\">The Web-Shaking Mirai Botnet Is Splintering&#8212;But Also Evolving<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"306\">The &#39;Secure&#39; Wi-Fi Standard Has a Huge, Dangerous Flaw<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"316\">What We Know About Friday&#39;s Massive East Coast Internet Outage<\/p>\n<p data-reactid=\"317\">Reaper has shown no signs of any DDoS activity yet, Qihoo 360 and Check Point note. But the malware includes a Lua-based software platform that allows new code modules to be downloaded to infected machines. That means that it could shift its tactics at any time to start weaponizing its hijacked routers and cameras.<\/p>\n<p data-reactid=\"318\">Horowitz points out that hacking devices like IP-based cameras en masse doesn&#x27;t provide many other criminal uses than as DDoS ammunition, though the motivation for any such DDOS attack is still unclear.<\/p>\n<p data-reactid=\"319\">&quot;We don&#x27;t know if they want to create some global chaos, or do they have some specific target, vertical, or industry they want to take down?&quot; she asks.<\/p>\n<p data-reactid=\"320\">All of that adds up to an increasingly troubling situation: One where the owners of IoT devices are racing with a botnet master to disinfect devices faster than the malware can spread, with serious potential consequences for vulnerable DDoS targets around the world. And given that Reaper has far more sophisticated tools than Mirai, the impending volley of attacks may turn out to be even more dire than the last one.<\/p>\n<p class=\"related-cne-video-component__dek\" data-reactid=\"330\">DDoS! It stands for distributed denial of service, a kind of attack that turns insecure, internet-connected devices into a sort of zombie army. So here&#39;s how you can avoid being part of that zombie army.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/reaper-iot-botnet-infected-million-networks\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59ea6cf8ce22fd0cca3c52bb\/master\/pass\/Botnet-FINAL-843353850.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Fri, 20 Oct 2017 21:45:34 +0000<\/strong><\/p>\n<p>Building on the devastating Mirai botnet that took major sites offline a year ago, Reaper has some scary new tricks.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-10019","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10019"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10019\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10019"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}