未加星标

RSA 2017: SophosLabs sees spike in Linux-IoT malware

字体大小 | |
[系统(linux) 所属分类 系统(linux) | 发布者 店小二04 | 时间 2017 | 作者 红领巾 ] 0人收藏点击收藏

RSA 2017: SophosLabs sees spike in Linux-IoT malware

Attackers are increasingly using linux security holesto target and infect Internet of Things (IoT) devices that include everything from webcams to internet-connecting household appliances.

That’s among the findings in a SophosLabsmalware forecast released today, the first day of RSA Conference 2017 in San Francisco.

A hot topic at RSA

IoT threats have been discussed at RSA Conference for years now, but in largely theoretical terms. Thispast year, the theoretical turned into reality whenMirai malware was used to hijack internet-facing webcams and other devices into massive botnets that were then used to launch a coordinated assault against Dyn , one of several companies hosting the the Domain Name System (DNS). That attack crippled such major sites as Twitter, Paypal, Netflix and Reddit .

For that reason, the new SophosLabs report starts with a look at IoT threats. Based on months of research, SophosLabs determined that malware is being used to infect IoT devices via vulnerabilities in Linux.Default passwords, out-of-date versions of Linux and a lack of encryption will continue to make these devices ripe for abuse.

Linux malware

The frequency and complexity of Linux malware rose throughout 2016.One malware sample was built to evade AV detection with consistent static updates, encrypted/obfuscated strings and even some rudimentary UPX packer hacking.

SophosLabs noticed one family that was far more active than any of the others Linux/ DDoS-BI, also known as Gayfgt which spread by simply scanning over large IP blocks attempting to bruteforce SSH. It targeted low-hanging fruit such as any device that has a factory/default password.

In terms of frequency, cases of Linux/DDoS-BI have steadily increased since October, with brief drop-offs along the way. It is proving to be resilient. For example, more than a hundred cases were observed by late October and was up to around 150 by mid-November. By mid-December it was over 200, and it was up around 466 the week of January 20 before slightly dropping again.

The numbers represent samples processed by SophosLabs with a significant portion obtained by SophosLabs-run honeypots. They do not represent customer-reported detections.

Rising tide of LUA and Golangcode

SophosLabs expects an increase in complexity and a lot more LUA and Golang-based malware in the short term. It’s possible these will eventually drop off purely due to its compiled file size (Hello World in Go is ~500KB), as it’ll be more noticeable especially on embedded devices with limited resources.

Whatever happens in the next 12 months, one thing is clear: Golang a free, open source programming language created at Google has seen a surge in popularity among tool writers.

The ultimate target: IoT devices

Though the Linux malware we deconstructed has been used for a variety of purposes, we continue to watch for cases connected to attacks against IoT devices.

SophosLabs continues to receive samples of Mirai, the malware used in last year’s IoT-based attack against Dyn. In the following image, honeypot logs show Mirai going for low-hanging fruit as the username/password combo is root/root:


RSA 2017: SophosLabs sees spike in Linux-IoT malware

Next we see script that is typical for the Mirai, Gayfgt and Tsunami families, where they download a variety of different platform samples and try to run them to see if something works. Take note of the file name “dvrHelper” that the files are downloaded and saved as:


RSA 2017: SophosLabs sees spike in Linux-IoT malware

The next screenshot is of IDA disassembly. The left pane shows some individual characters that end up matching “dvrHelper” just not in order, as it seems they want to check the path. The right pane shows deobfuscated strings including a YouTube link to Rick Astley “Never Gonna Give You Up” (a bait-and-switch trick known asrickrolling).


RSA 2017: SophosLabs sees spike in Linux-IoT malware

It’s important to note that despite all the news coverage Mirai has received, we haven’t seen much of it affecting our customers. We see roughly two in 10,000 endpoints reporting Mirai detections.

But taken as a whole, the various malware samples reviewed by the lab point to an upward trajectory in IoT attacks.

Coming tomorrow: A look at the top 10 malware targeting Android.

本文系统(linux)相关术语:linux系统 鸟哥的linux私房菜 linux命令大全 linux操作系统

主题: LinuxAndroidUATwitterPaypal
分页:12
转载请注明
本文标题:RSA 2017: SophosLabs sees spike in Linux-IoT malware
本站链接:http://www.codesec.net/view/533331.html
分享请点击:


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 系统(linux) | 评论(0) | 阅读(27)