Security researchers detected a previously undocumented botnet named Gucci, which is capable of launching multiple types of distributed denial-of-service (DDoS) attacks against targeted organizations.

In an email exchange with SecurityWeek, SecNiche Security Labs researchers Aditya K Sood and Rohit Bansal analyzed the internet of things (IoT) threat’s binaries and observed that the Gucci botnet was targeting ARM, x86, MIPS, PPC, M68K and other architectures. This investigation revealed that a server located in the Netherlands was distributing the obfuscated binaries. It also showed that bad actors had stripped all the debug symbols from the binaries, thereby reducing their overall size.

After discovering that each Gucci bot was attempting to connect to a remote IP address on TCP port 5555, Sood and Bansal used automation to authenticate themselves and thereby gain access to the threat’s command-and-control (C&C) panel. They then uncovered that anyone with access to the panel could use the threat to conduct a variety of DDoS attacks, including UDP flood, SYN flood, ACK flood, UDP flood with less protocol options and GRE IP flood. Not long thereafter, however, those operating the botnet discovered the compromise and removed the TCP service from the host.

Not the Only IoT Threat to Recently Emerge

The Gucci botnet isn’t the only IoT-based threat of its kind to emerge in 2019. Back in March, Trend Micro discovered a new Mirai variant targeting smart TVs and wireless presentation systems commonly used by businesses. A couple months later, WootCloud spotted the Ares ADB botnet going after Android-based IoT devices such as set top boxes (STBs) and TVs. Most recently, in June, ZDNet learned of Silex, malware that wipes the firmware of infected IoT devices.

How to Defend Against the Gucci Botnet

Security professionals can help their organizations defend against the Gucci botnet by implementing security by design at the earliest stages of any and all IoT projects. This includes using a layered approach with IoT devices and disconnecting any build projects from public networks. Companies should also consider enlisting the help of a third party to help prevent a DDoS attack launched by an IoT botnet.

More from

What to know about new generative AI tools for criminals

3 min read - Large language model (LLM)-based generative AI chatbots like OpenAI’s ChatGPT took the world by storm this year. ChatGPT became mainstream by making the power of artificial intelligence accessible to millions.The move inspired other companies (which had been working on comparable AI in labs for years) to introduce their own public LLM services, and thousands of tools based on these LLMs have emerged.Unfortunately, malicious hackers moved quickly to exploit these new AI resources, using ChatGPT itself to polish and produce phishing…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Data never dies: The immortal battle of data privacy

4 min read - More than two hundred years ago, Benjamin Franklin said there is nothing certain but death and taxes. If Franklin were alive today, he would add one more certainty to his list: your digital profile. Between the data compiled and stored by employers, private businesses, government agencies and social media sites, the personal information of nearly every single individual is anywhere and everywhere. When someone dies, that data becomes the responsibility of the estate; but what happens to the privacy rights…

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution? Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task. In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each…