Mirai Malware Simplifies Internet Attacks Like Last Week's

Advertisement
By Associated Press | Updated: 25 October 2016 16:42 IST
Highlights
  • Dyn said its servers were hit by a distributed denial-of-service attack
  • Mirai makes it easy for an attacker to scan the Internet for devices
  • More attacks are inevitable in light of growth of connected devices

A massive Internet attack that paralyzed Twitter, Netflix and other services is being blamed on a specific kind of malware designed to harness the power of ordinary consumer devices.

The bad news: Using it isn't particularly hard and doesn't require much money. The malware, known as Mirai, was recently posted online for others to adapt for their own attacks.

Researchers say Mirai exploited security vulnerabilities in thousands of internet-connected devices such as web cameras, then used those devices to attack a major internet firm, resulting in widespread outages. Researchers say Mirai has been used before, but not on the scale of Friday's attacks.

Advertisement

Here's a look at Mirai and what makes it so destructive.

Advertisement

What happened?
Dyn Inc., an Internet company in Manchester, New Hampshire, said its servers were hit by a distributed denial-of-service attack. These types of attacks work by overwhelming targeted computers with junk traffic, so legitimate traffic can't get through.

Jason Read, founder of the Internet performance monitoring firm CloudHarmony, said his company tracked a half-hour-long disruption early Friday affecting access to many popular sites from the East Coast. A second attack later in the day spread disruption to the West Coast as well as some users in Europe.

Advertisement

What made this attack so nasty?
While distributed denial-of-service attacks have been around for years, hackers have many more devices they can use to pull off their attacks, thanks to the proliferation of Internet-connected cameras, thermostats, lights and more.

And Mirai makes it easy for a would-be attacker to scan the Internet for devices to take over and turn into "botnets" for launching coordinated attacks, Chris Carlson of the cybersecurity firm Qualys said.

Advertisement

While botnets have been used as weapons for nearly a decade, they have typically been employed by organized crime groups that targeted websites involved in less-than-savory businesses such as pornography or gambling. Those sites pay extortion money to make the problem go away quietly, Carlson said.

"But when you bring it to Dyn, and a lot of the internet gets shut down, people take notice," Carlson said.

What kinds of devices were affected?
Researchers at the cybersecurity firm Flashpoint say very few devices in the US seem to be involved.

Most of the junk traffic heaped on Dyn came from internet-connected cameras and video-recording devices that had components made by an obscure Chinese company. Those components had little security protection, so devices they went into became easy to exploit.

(Also see: Xiongmai Says Its Cameras Were Used to Take Down the Internet)

Because the components were put into a variety of devices that were then packaged and rebranded, it's hard to tell exactly where they ended up. But Flashpoint researchers Allison Nixon and Zach Wikholm say their research shows that the bulk of them ended up in Vietnam, Brazil, Turkey, Taiwan and China.

Who's behind it?
That remains unclear. Nixon and Wikholm say it's unlikely that this is a state-sponsored attack. Because the blueprints, or source code, for Mirai were public, an attack like this wouldn't need a government's resources.

Hacker groups have claimed responsibility through Twitter, but those claims haven't been verified and the pair says it's likely that they're all lying.

"These guys are amateurs and they managed to get this far. That's kind of scary," Nixon said.

Are more attacks coming?
Probably. Hacker groups have threatened targets ranging from the Russian government to major corporations and the US presidential election. But it's unclear if those groups are actually capable, or just making empty threats.

Experts say that whatever the target, more attacks are inevitable in light of the continued growth of connected devices and the lack of security requirements for them. Therefore, the solution lies in boosting device security at the hardware level.

"At the end of the day, these attacks aren't super sophisticated," Carlson says. "They're just a blunt hammer and whoever has the biggest hammer wins."

The Department of Homeland Security said Monday that it's been working on security practices for internet-connected gadgets and will release them in the common weeks.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Realme 15T With 50-Megapixel Selfie Camera Debuts in India: See Price
  2. Amazon Great Indian Festival Sale: Deals on Smartphones, Laptops Teased
  3. Su From So OTT Release Date is Here! Know all the Details
  4. India's Indigenous Vikram Microprocessor Showcased at Semicon India 2025
  5. Redmi 15 5G, Note 14 Pro Prices Dropped During Diwali With Xiaomi Sale
  6. Cannibal Solar Storm May Trigger Aurora in the Sky Soon
  1. BCCI Says Crypto, Real Money Gaming Platforms Can’t Bid for Team India’s Title Sponsorship
  2. Scientists Discover Hidden Mantle Layer Beneath the Himalayas Challenging Century-Old Theory
  3. Astronomers Propose Rectangular Telescope to Hunt Earth-Like Planets
  4. Microsoft Testing Native Clipboard Sync Feature to Share Text Between Windows PCs, Android Devices
  5. Su From So OTT Release: When and Where to Watch This Kannada-Language Horror-Comedy Online
  6. Sennheiser Momentum 4 Wireless 80th Anniversary Edition Launched in India With Up to 60 Hour Battery Life
  7. Call of Duty Film Adaption Said to Be a 'Priority' at Paramount, Negotiations on to Acquire Rights
  8. Cannibal Solar Storm May Trigger Auroras as Powerful Geomagnetic Storm to Hit Earth Soon
  9. Apple's iPhone 8 Plus Listed as Vintage Product Ahead of iPhone 17 Launch, 11-Inch MacBook Air Now Obsolete
  10. Hidden Reason Behind Portugal’s Deadly Earthquakes Finally Explained
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.