
Defending against doxing
In this Studio 471, Jacob Larsen discusses the effects of doxing, how sites like Doxbin take advantage of legal loopholes and how to defend against being doxed.
When cybersecurity professionals hear the term “Mirai,” the vast majority will immediately think of the significant distributed denial of service (DDoS) attack that was launched with the malware on October 21, 2016. However, since that incident, Mirai has fractured into several new forms, all with primarily the same goal: to infect applications, communication channels, machines and software related to the Internet of Things.
In 2020 and 2021, Intel 471 observed a surge in Internet of Things (IoT) device attacks. Threat actors seized the opportunity to not only create large botnets, but also steal confidential data from IoT devices linked to compromised organizations, and potentially sell it on underground marketplaces. Our research found these actors typically targeted devices — mainly in Europe and North America — by deploying two kinds of botnet malware: Gafgyt and Mirai. Our research also uncovered that numerous threat actors have developed and are selling access to botnets built from Mirai code bases. These research findings further support that Mirai has been extremely influential in providing source code for IoT-focused botnets.
Given the total number of IoT devices connected worldwide is projected to be about 30.9 billion devices by 2025, the attack surface for these botnets is only going to grow. By understanding how the underground is leveraging the flaws in these devices, proactive measures can be taken to prevent the damage actors could inflict on their organizations through this technology.
Many botnets that are derivatives of Mirai — including BotenaGo, Echobot, Gafgyt, Loli, Moonet, Mozi and Zeroshell — have been active since the start of the COVID-19 pandemic in early 2020 and have continued to evolve throughout 2021. Some of the actions we have observed:
Additionally, we observed other threat actors demonstrate a willingness to form partnerships in order to deploy proxy malware on IoT devices. In July 2021, one particular actor was looking for partners after claiming to develop new IoT malware that could establish socket secure internet protocol (SOCKS5) proxies, kill other processes and develop honeypots to trap other malware on infected devices.
Given the breadth of devices that fall under the “Internet of Things” umbrella — smartwatches, driverless vehicles, thermostats, smart TVs, insulin pumps, and pacemakers, to name a few — threat actors have a plethora of targets to direct their attacks against.
We observed several Common Vulnerabilities and Exposures (CVEs) impacting IoT devices that included:
Aside from these vulnerabilities, we also observed threat actors offering an increased quantity of buffer overflow and path traversal vulnerabilities that are used to deploy Mirai-based botnets.
When discussing how they would like to exploit these vulnerabilities, actors typically listed specific parameters, including the type of exploit, amount of devices online impacted by the exploit and the location of such devices. The amount of devices usually ranged from 2,000 to 3,000. Additionally, some threat actors appeared to want proof of concepts (PoCs) or exploits that were not available publicly, likely to maintain a level of exclusivity.
We assess with a high degree of confidence IoT security will remain of significant importance to organizations moving forward. The tactics, techniques and procedures (TTPs) likely will continue and indicate a resourceful interest and investment in exploring the full potential of this attack method. The cybercriminal underground will continue to build off of Mirai, targeting every piece of equipment it can as the IoT market continues to boom.
To combat the risks this challenging security landscape poses, IoT and business strategies must be complementary and tightly integrated. Intel 471 recommends organizations monitor all IoT devices, apply network sectionalization, perform security audits, regularly implement security patches and updates, and routinely change default credentials and cryptographic keys.
In this Studio 471, Jacob Larsen discusses the effects of doxing, how sites like Doxbin take advantage of legal loopholes and how to defend against being doxed.
The leader of the Black Basta ransomware group employed a trusted, experienced cybercrime actor nicknamed Tinker who he relied on for phishing content, call center management and negotiation skills.
The DanaBot malware was severely disrupted by law enforcement. Here's an in-depth look at this data-stealing workhorse for the cybercriminal underground.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.