September 1, 2016 By Larry Loeb 2 min read

Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. The BASHLITE malware family has been around for a while and has many variants.

L3 has been working with security firm Flashpoint to observe the growth of the botnet, which the malware uses to carry out its attack. Threatpost reported that in July, the researchers tracked command-and-control (C&C) locations that were linked to the malware and found that they were communicating with only 74 bots. At a later time, the researchers observed the C&C servers communicating with about 120,000 bots.

BASHLITE Malware Targets IoT Devices

L3 noted in the report that cybercrime groups such as Lizard Squad and Poodle Corp are increasingly targeting IoT devices with which to build botnets that can conduct DDoS attacks. They can use these botnets themselves, or they may rent them to individuals as booter or stresser services (i.e., DDoS-as-a-service). These bot herders favor security camera DVRs, which are used to collect video from security cameras, since most video devices are connected to a network.

A large percentage of the 1 million infected devices were located in Taiwan, Brazil and Colombia, L3 reported. It seems many of these bots were using generic, white-labeled DVRs.

The report basically found that a stripped-down device with no true authentication control (or an admin/admin default screen hiding somewhere) can be transformed into a willing servant with the right malware.

Big Shift in Botnet Composition

Ninety-six percent of the botnet devices used by this malware were IoT devices. Roughly 4 percent of the devices were home routers; somewhat surprisingly, less than 1 percent were tied to a Linux server.

The researchers noted that this distribution represents a large shift in the composition of botnets, compared to the traditional DDoS botnet models based on compromised servers and home routers.

The actual DDoS attacks are simple UDP and TCP floods. High-bandwidth attacks are more often used in UDP floods, while high packets-per-second attacks are typically used for TCP floods.

Fortunately, L3 found that most of the attacks are short-lived. The median duration was just over two minutes, and 75 percent of the attacks timed out shorter than five minutes.

More from

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today