Look Into The Future
- Analyzing Mirai botnet -
Mauritius 2016 FIRST TC Minoru Kobayashi Internet Initiative Japan Inc.
Look Into The Future - Analyzing Mirai botnet - Mauritius 2016 - - PowerPoint PPT Presentation
Look Into The Future - Analyzing Mirai botnet - Mauritius 2016 FIRST TC Minoru Kobayashi Internet Initiative Japan Inc. Who am I ? Minoru Kobayashi I work for Internet Initiative Japan Inc.. IIJ is a Japanese ISP (We are the
Mauritius 2016 FIRST TC Minoru Kobayashi Internet Initiative Japan Inc.
system
for Japanese government and so on.
report (called “IIR”) and blogs
and so on.
“OVH” in late September.
October, suddenly.
Kanji characters are pronounced “Mirai”.
title to this presentation “Looking Into The Future”.
the hacking community “Hackforums”.
his avatar and his handle name is “Anna-senpai”.
future.
contains some Russian strings. Therefore Anna-senpai
people.
①Register Bot ②Scan random IP addresses and Attempt to login ③Report the IP address and credential ④Pass credentials ⑤Send commands to download Bot binary ⑥Request to download Bot binary ⑨DDoS Attack ⑧Use Mirai via CLI/API
C&C DB Scan Receiver Loader Victim Server Admin/User
HTTP/TFTP Server
IoT (Victim) IoT (Bot)
⑦Execute Bot binary
Attack ID Command Description udp UDP flood 1 vse Valve source engine specific flood 2 dns DNS resolver flood using the targets domain, input IP is ignored 3 syn SYN flood 4 ack ACK flood 5 stomp TCP stomp flood 6 greip GRE IP flood 7 greeth GRE Ethernet flood 8 (none) Proxy knockback connection 9 udpplain UDP flood with less options. optimized for higher PPS 10 http HTTP flood
Attack ID 8 is assigned, but not implemented.
So you can write IDS/IPS signatures easy.
This traffic is a part of process 5. You can see “/bin/busybox wget” command.
flow:to_server,established; content:"|00 00 00 01|"; depth:4; sid:1000000; rev:1)
Telnet (wget)"; flow:to_server,established; content:"/bin/busybox wget http://"; content:"/bins/mirai."; content:"-O - > dvrHelper|3b| /bin/busybox chmod 777 dvrHelper|3b| /bin/busybox ECCHI"; sid:1000070; rev:1)
But attackers can easily modify these indicator of attack, so these may not detect new version or variants of Mirai. Be careful. All the Snort signature I wrote, will be published in our quarterly report IIR next issue (Vol.33).
①Register Bot ②Scan random IP addresses and Attempt to login ③Report the successful IP address and credential ④Transfer credentials ⑤Send commands to download Bot binary ⑥Request to download Bot binary ⑨DDoS Attack ⑧Use Mirai via CLI/API
C&C DB Scan Receiver Loader Victim Server Admin/User
HTTP/TFTP Server
IoT (Victim) IoT (Bot)
⑦Run Bot binary
192.168.153.10 192.168.153.20 192.168.153.100
2323/tcp.
to these ports rise abruptly.
(e.g. Telnet, SSH, WebUI, etc.).
get high performance for DDoS.
infected.
is placed in online manual.
set up an access control list.
protocols such as SSH/HTTPS.