September 1, 2016 By Larry Loeb 2 min read

Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. The BASHLITE malware family has been around for a while and has many variants.

L3 has been working with security firm Flashpoint to observe the growth of the botnet, which the malware uses to carry out its attack. Threatpost reported that in July, the researchers tracked command-and-control (C&C) locations that were linked to the malware and found that they were communicating with only 74 bots. At a later time, the researchers observed the C&C servers communicating with about 120,000 bots.

BASHLITE Malware Targets IoT Devices

L3 noted in the report that cybercrime groups such as Lizard Squad and Poodle Corp are increasingly targeting IoT devices with which to build botnets that can conduct DDoS attacks. They can use these botnets themselves, or they may rent them to individuals as booter or stresser services (i.e., DDoS-as-a-service). These bot herders favor security camera DVRs, which are used to collect video from security cameras, since most video devices are connected to a network.

A large percentage of the 1 million infected devices were located in Taiwan, Brazil and Colombia, L3 reported. It seems many of these bots were using generic, white-labeled DVRs.

The report basically found that a stripped-down device with no true authentication control (or an admin/admin default screen hiding somewhere) can be transformed into a willing servant with the right malware.

Big Shift in Botnet Composition

Ninety-six percent of the botnet devices used by this malware were IoT devices. Roughly 4 percent of the devices were home routers; somewhat surprisingly, less than 1 percent were tied to a Linux server.

The researchers noted that this distribution represents a large shift in the composition of botnets, compared to the traditional DDoS botnet models based on compromised servers and home routers.

The actual DDoS attacks are simple UDP and TCP floods. High-bandwidth attacks are more often used in UDP floods, while high packets-per-second attacks are typically used for TCP floods.

Fortunately, L3 found that most of the attacks are short-lived. The median duration was just over two minutes, and 75 percent of the attacks timed out shorter than five minutes.

More from

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

How red teaming helps safeguard the infrastructure behind AI models

4 min read - Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological innovation is very rapid, security often ends up being a secondary consideration. This is increasingly evident from the ad-hoc nature of many implementations, where organizations lack a clear strategy for responsible AI use.Attack surfaces aren’t just expanding due to risks and vulnerabilities in AI models themselves but also in the underlying infrastructure that supports them. Many foundation…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today