<!--DEBUG:--><!--DEBUG:dc3-united-states-it-in-english-pdf-2--><!--DEBUG:--><!--DEBUG:dc3-united-states-it-in-english-pdf-2--><!--DEBUG-spv-->{"id":508120,"date":"2017-04-17T15:35:00","date_gmt":"2017-04-17T13:35:00","guid":{"rendered":"http:\/\/nhub.news\/?p=508120"},"modified":"2017-04-18T05:11:17","modified_gmt":"2017-04-18T03:11:17","slug":"rival-iot-malware-clash-in-a-botnet-territory-battle","status":"publish","type":"post","link":"http:\/\/nhub.news\/fr\/2017\/04\/rival-iot-malware-clash-in-a-botnet-territory-battle\/","title":{"rendered":"Rival IoT malware clash in a botnet territory battle"},"content":{"rendered":"<p style=\"text-align: justify;\"><b>The Hajime malware is competing with the Mirai malware to enslave some internet of things devices<\/b> <br \/>Mirai\u2014a notorious malware that\u2019s been enslaving IoT devices\u2014has competition. <br \/>A rival piece of programming has been infecting some of the same easy-to-hack internet-of-things (IoT) products, with a resiliency that surpasses Mirai, according to security researchers. <br \/>\u201cYou can almost call it Mirai on steroids,\u201d said Marshal Webb, CTO at BackConnect , a provider of services to protect against distributed denial-of-service (DDoS) attacks. <br \/>Security researchers have dubbed the rival IoT malware Hajime, and since it was discovered more than six months ago, it\u2019s been spreading unabated and creating a botnet. Webb estimates it\u2019s infected about 100,000 devices across the globe. <br \/>These botnets, or networks of enslaved computers, can be problematic. They\u2019re often used to launch massive DDoS attacks that can take down websites or even disrupt the internet\u2019s infrastructure. <br \/>That\u2019s how the Mirai malware grabbed headlines last October. A DDoS attack from a Mirai-created botnet targeted DNS provider Dyn, which shut down and slowed internet traffic across the U. S. <br \/>Hajime was first discovered in the same month, when security researchers at Rapidity Networks were on the lookout for Mirai activity. What they found instead was something similar, but also more tenacious. <br \/>Like Mirai, Hajime also scans the internet for poorly secured IoT devices like cameras, DVRs, and routers. It compromises them by trying different username and password combinations and then transferring a malicious program. <br \/>However, Hajime doesn\u2019t take orders from a command-and-control server like Mirai-infected devices do. Instead, it communicates over a peer-to-peer network built off protocols used in BitTorrent, resulting in a botnet that\u2019s more decentralized\u2014and harder to stop. <br \/>\u201cHajime is much, much more advanced than Mirai,\u201d Webb said. \u201cIt has a more effective way to do command and control.\u201d <br \/>Broadband providers have been chipping away at Mirai-created botnets, by blocking internet traffic to the command servers they communicate with. In the meantime, Hajime has continued to grow 24\/7, enslaving some of the same devices. Its peer-to-peer nature means many of the infected devices can relay files or instructions to the rest of the botnet, making it more resilient against any blocking efforts. <br \/>Hajime infection attempts (blue) vs. Mirai infection attempts (red), according to a honeypot from security researcher Vesselin Bontchev. <br \/>Who\u2019s behind Hajime? Security researchers aren\u2019t sure. Strangely, they haven\u2019t observed the Hajime botnet launching any DDoS attacks\u2014which is good news. A botnet of Hajime\u2019s scope is probably capable of launching a massive one similar to what Mirai has done. <br \/>\u201cThere\u2019s been no attribution. Nobody has claimed it,\u201d said Pascal Geenens, a security researcher at security vendor Radware. <br \/>However, Hajime does continue to search the internet for vulnerable devices. Geenens\u2019 own honeypot, a system that tracks botnet activity, has been inundated with infection attempts from Hajime-controlled devices, he said. <br \/>So the ultimate purpose of this botnet remains unknown. But one scenario is it\u2019ll be used for cybercrime to launch DDoS attacks for extortion purposes or to engage in financial fraud. <br \/>\u201cIt\u2019s a big threat forming,\u201d Geenens said. \u201cAt some point, it can be used for something dangerous.\u201d <br \/>It\u2019s also possible Hajime might be a research project. Or, in a possible twist, maybe it\u2019s a vigilante security expert out to disrupt Mirai. <br \/>So far, Hajime appears to be more widespread than Mirai, said Vesselin Bontchev , a security expert at Bulgaria\u2019s National Laboratory of Computer Virology. <br \/>However, there\u2019s another key difference between the two malware. Hajime has been found infecting a smaller pool of IoT devices using ARM chip architecture. <br \/>That contrasts from Mirai, which saw its source code publicly released in late September. Since then, copycat hackers have taken the code and upgraded the malware. Vesselin has found Mirai strains infecting IoT products that use ARM, MIPS, x86, and six other platforms. <br \/>That means the clash between the two malware doesn\u2019t completely overlap. Nevertheless, Hajime has stifled some of Mirai\u2019s expansion. <br \/>\u201cThere\u2019s definitely an ongoing territorial conflict,\u201d said Allison Nixon, director of security research at Flashpoint. <br \/>To stop the malware, security researchers say it\u2019s best to tackle the problem at its root, by patching the vulnerable IoT devices. But that will take time and, in other cases, it might not even be possible. Some IoT vendors have released security patches for their products to prevent malware infections, but many others have not, Nixon said. <br \/>That means Hajime and Mirai will probably stick around for a long time, unless those devices are retired. <br \/>\u201cIt will keep going,\u201d Nixon said. \u201cEven if there\u2019s a power outage, [the malware] will just be back and re-infect the devices. It\u2019s never going to stop.\u201d<\/p>\n<div id=\"td_post_ranks\" class=\"td-post-comments\" style=\"vertical-align: middle;\">\n<div style=\"float: left;\">Similarity rank: 1.1<\/div>\n<\/div>\n<p><script>\njQuery(function() {\nvar mainContentMetaInfo = '.td-post-header .meta-info';\nvar tdPostRanks = '#td_post_ranks';\nif (jQuery(tdPostRanks).length) {\n    var tdPostRanksHtml = jQuery(tdPostRanks).get(0).outerHTML;\n    if (typeof tdPostRanksHtml != 'undefined') {\n        jQuery(tdPostRanks).remove();\n        jQuery(mainContentMetaInfo).append(tdPostRanksHtml);\n    }\n}\n});\n<\/script><span>\u00a9 Source: <a href=\"http:\/\/www.infoworld.com\/article\/3190524\/security\/iot-malware-clashes-in-a-botnet-territory-battle.html\" target=\"_blank\">http:\/\/www.infoworld.com\/article\/3190524\/security\/iot-malware-clashes-in-a-botnet-territory-battle.html<\/a><br \/>\nAll rights are reserved and belongs to a source media.<\/span><\/p>\n<script>jQuery(function(){jQuery(\"#td_post_ranks\").remove();});<\/script><script>jQuery(function(){jQuery(\".td-post-content\").find(\"p\").find(\"img\").hide();});<\/script>","protected":false},"excerpt":{"rendered":"<p>The Hajime malware is competing with the Mirai malware to enslave some internet of things devices Mirai\u2014a notorious malware that\u2019s been enslaving IoT devices\u2014has competition. A rival piece of programming has been infecting some of the same easy-to-hack internet-of-things (IoT) products, with a resiliency that surpasses Mirai, according to security researchers. \u201cYou can almost call [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":508119,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[90],"tags":[],"_links":{"self":[{"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/posts\/508120"}],"collection":[{"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/comments?post=508120"}],"version-history":[{"count":1,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/posts\/508120\/revisions"}],"predecessor-version":[{"id":508121,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/posts\/508120\/revisions\/508121"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/media\/508119"}],"wp:attachment":[{"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/media?parent=508120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/categories?post=508120"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/nhub.news\/fr\/wp-json\/wp\/v2\/tags?post=508120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}