attackofthings-level3-2016

0001-01-01

Attack of Things!

by Level 3 Threat Research Labs

August 25, 2016

https://web.archive.org/web/20161003194500/http://blog.level3.com/security/attack-of-things/

Notes
Internet
IoT
Level 3
threat research
malware
Linux malware
DDoS
botnet
BASHLITE, Lizkebab, Torlus, gafgyt
command and control
C
cross compile
embedded system
architecture
IRC
IRC C2
vulnerability scanning
port scan
telnet
brute force
username, password
SSH
SSH brute forcing
leaked source code in early 2015 https://github.com/hammerzeit/BASHLITE
Lizard Squad
Poodle Corp
DDoS as a Service
DVR
IP camera
web interface
default credentials
low-hanging fruit
wget
busybox
payload
Taiwan
Brazil
Colombia
H.264 DVR
white-labeled
Dahua Technology
router
Flashpoint
tracked C2 due to hard-coded c2 addresses within samples
botnet takedown
botnet operators seemingly unphased by takedowns because its easy to start over
median active time of C2 is around 13 days
booter
UDP flood, TCP flood
bandwidth
HTTP DDoS
webserver
some IoT devices have hard-coded credentials that cannot be changed
review devices before purchase

Links to this note