

Mirai Variant Cross-Compiles Attack Code with Aboriginal Linux
source link: https://www.tuicool.com/articles/hit/MN32M3z
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.


The approach makes Mirai executable on a wide variety of disparate IoT devices and platforms from a single server.
Criminals behind a Mirai botnet have been spotted using an unusual technique: Leveraging an open-source project called Aboriginal Linux to create a compiled binary, with versions of the malware tailored to each targeted platform.
The malware authors are leveraging Aboriginal – a legitimate tool for cross-compilation – to make Mirai executable on a wide variety of internet of things (IoT) devices and platforms, including routers, IP cameras, connected devices and Android devices.
“One of the major pain points for a cross-platform IoT botnet is portability,” wrote Dinesh Venkatesan, principal threat analysis engineer at Symantec, in an writeup Thursday. “The malware must be able to run on different architectures and platforms in a self-contained capsule without any runtime surprises or misconfiguration. This is also an area where many inexperienced malware authors, or script-kiddies, fail if they simply copy/paste and reuse the existing malware code base.”
Using Aboriginal “makes the process of easy, effective, and practically fail-proof,” he added.
Venkatesan found a live remote server hosting multiple Mirai variants, each for a specific platform, in late July. He saw that the server aimed shell script at vulnerable devices, which then started downloading and executing a series of individual executables until one that was capable of infecting the specific platform was found. That file in turn downloaded the Mirai payload.
The successfully executed executable file is responsible for the actual Mirai payload, such as enumerating a list of IP addresses by creating a list of random addresses and scanning for devices with default credentials, or vulnerabilities. Thus, the same botnet could use, say, an ARM7 malware variant running on an Android device, as well as one using Debian ARM.
The functionality is otherwise standard Mirai fare, according to Venkatesan.
“For example, when I executed the sample in a contained environment, it attempted to scan more than 500,000 IP addresses generated through the random generation process previously described, and then tried to send raw packet data over port 23,” he said.
The discovery marks yet another progression of Mirai – the malware has been morphing and adding sophistication since its source code was leaked in 2016, shortly after it burst on the scene with a head-turning DDoS attack that took outDNS provider Dyn, taking major sites like Spotify, Reddit and Twitter offline. It was also responsible for a 620Gbps DDoS attack on Krebs on Security, and even took the entire nation of Liberia offline for a while.
For instance, in April a Mirai botnet was used tolaunch a series of DDoS campaigns against the financial sector, using the relatively small number of 13,000 hijacked IoT devices (many IoT botnets number in the millions of endpoints). The notable aspect of it were its characteristics that link it toIoTroop (a.k.a. Reaper) botnet first identified October 2017. The IoTroop code allows the malware to be updated on the fly.
Meanwhile, its tactic of marshalling vulnerable IoT devices has allowed Mirai andits many variants to attack with increasing regularity.
“As it is, the IoT market is hugely fragmented and most of the devices do not receive software patches for the known vulnerabilities,” said Venkatesan. “To make things worse, the malware authors continue to evolve these variants, making the malware more powerful and portable across different platforms and architectures.”
Recommend
-
20
Prologue A month ago I wrote about IoT malware for Linux operating system, a Mirai botnet's client variant dubbed as FBOT. The writing [link] was about reverse engineering Linux ELF ARM 32bit to dissect...
-
8
The Apple M1 compiles Linux 30% faster than my Intel i9 June 1, 2021 (With a caveat: I'm compiling the ARMv...
-
6
News » News & Analysis » Indigenous firm New Future IT is developing the next generation of Aborigina...
-
6
Mining firm Rio Tinto sorry for destroying Aboriginal cavesPublished31 May 2020image copyrightAFPimage captionJuukan Gorge cave site: Rio Tinto got permission to expand its mining in 2013...
-
11
Overview In July 2021 we blogged about Mirai_ptea, a botnet spreading through an undisclosed vulnerability in KGUARD D...
-
11
Researchers demystify the secrets of ancient Aboriginal migration across AustraliaBy Dana MorsePosted Fri 30 Apr 2021 at 3:16am
-
2
Overview On Oct 21, 2022, 360Netlab's honeypot system captured a suspicious ELF file ee07a74d12c0bb3594965b51d0e45b6f, which propagated via F5 vulnerability with zero VT detection, our system observces that it c...
-
13
News New Mirai botnet variant V3G4 targets Linux servers, IoT devices The new V3G...
-
8
Aboriginal Australian genomes reveal Indian ancestry ...
-
5
News Analysis Romanian cybercrime gang Diicot builds DDoS botnet with Mirai variant
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK