Want to be a reporter or would you like to buy a report for the best price?
Just Sign Up here!
Privacy guidelines License our content Help
Cybercrime gangs form botnets by infecting internet-enabled devices, often wireless cameras or routers with weak security features. Once corralled, controllers can send commands for the botnet to overwhelm a target, knocking its website offline or crippling the internet, reported South China Morning Post (Hong Kong).
The new botnet has spread across the United States, Australia and other parts of the globe, researchers say, although Check Point notes that “it is too early to assess the intentions” of those propagating the infection.
“It could be something that’s meant to create global chaos,” Maya Horowitz, threat intelligence group manager at Check Point, said in a telephone interview from Israel. “But it could be something that’s more targeted,” perhaps aimed at a country or industry.
She said it is unlikely that cybersecurity experts will be able to halt an eventual attack.
“The chances are pretty low for that,” Horowitz said, adding that like an epidemic of infectious disease, “each infected device is looking for other devices to compromise.”
Criminal hackers are assembling increasingly powerful botnets.
“They are getting bigger and badder,” said Robert Hamilton, director of marketing at Imperva Incapsula, a Redwood Shores, California, cybersecurity firm that offers technology to mitigate botnet attacks.
“The motive more than ever is money,” he said, adding that criminal gangs send ransom demands to companies threatening to hit them with a distributed denial-of-service, or DDoS, attack unless paid off.
“We had a client that received a letter that said ‘if you don’t pay us, we are going to bring your websites down with a DDoS attack,’” Hamilton said. “This was a client that you’d definitely recognise their name,” declining to specify the company.
Last year’s Mirai botnet attack hit Dyn, a New Hampshire company that provides backbone services for the internet. Imperva says it found 49,657 infected devices spread over 164 countries. The top infected countries were Vietnam, Brazil and the United States.
Scores of major companies were hit in that October 21, 2016, attack, including Netflix, Twitter, Spotify, HBO, Amazon, CNN, ancestry.com and Comcast.
The new botnet is based on the source code for Mirai, Horowitz said, “but about 100 different functions have been added … and it has the potential to reach many, many more devices.”
The malware creating the botnet is infecting a variety of Internet of Things (IoT) devices but has been found with functions to target networking gear or routers manufactured by D-Link, TP-Link, AVTECH, NETGEAR, MikroTik, Linksys and Synology, Check Point said.
“Since Reaper is exploiting a number of known vulnerabilities in different IoT devices, this botnet could definitely be much more disruptive than Mirai,” said Merike Kaeo, chief technology officer at Farsight Security, a San Mateo, Calif., cybersecurity firm. “Known security issues in cameras, televisions, home routers, and any other internet-connected devices need to be addressed and fixed.”
Consumers can do their bit by checking to ensure that “all of their internet-connected devices, especially home routers, have the latest firmware upgrades and security patches installed,” Kaeo said
show source http://www.scmp.com/news/world/article/2116667/analysts-discover-monster-botnet-enslaving-10000-devices-daily-and