Home The Linux Distillery New wave of Mirai botnet surfaces, leveraging Linux to target IoT

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

New wave of Mirai botnet surfaces, leveraging Linux to target IoT Featured

A new wave of the Mirai botnet has been uncovered by Symantec, leveraging an open-source project that makes it more robust and compatible with multiple architectures and devices.

The Mirai botnet first surfaced in 2016, disrupting many of the world’s largest websites. Variants have been growing steadily, helped by an environment of poorly managed IoT devices, Symantec found, as well as by the release of the malware’s source code.

The new variants have been created by leveraging an open source project named Aboriginal Linux, with the effect of making the botnet more robust, and compatible with many diverse architectures and devices that range from routers, IP cameras, and other connected Internet of Things and Android-based devices.

Aboriginal Linux is no longer under active development, but had the goal of being the smallest Linux system capable of rebuilding itself under itself.

Malware must be able to run self-contained on a system, and when Symantec found the new variants they found the writers had exploited Aboriginal Linux’ cross-compilation facilities, making portability effortless. Aboriginal Linux, of course, has no involvement in malware and is an excellent open source project. It has simply been misappropriated by those with malicious intent.

Nevertheless, the end result is that a malicious person can be quite comfortable their botnet will execute and run on any targeted device, irrespective of its architecture.

Symantec has detailed the malware, which they label Linux.Mirai, and offers tips to protect your IoT devices from malware.

  • Research the capabilities and security features of your IoT devices.
  • Perform an audit of IoT devices on your network.
  • Change the default credentials on every device, using strong and unique passwords.
  • Use strong encryption for Wi-Fi.
  • Disable features and services which you do not require, including remote login.
  • Disable Universal Plug and Play (UPnP) on routers unless you absolutely require it.
  • Regularly check for firmware updates. 

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect