July 30, 2018 By Douglas Bonderud 2 min read

Security researchers have identified two new threats — Hide ‘N Seek (HNS) and Android Debug Bridge miner (ADB) — which are designed to compromise consumer devices to create Internet of Things (IoT) botnets.

When Fortinet initially tracked HNS in early 2018, the malware was using complex, peer-to-peer communication to compromise routers, IP cameras and DVRs. Over the past several months, the creators added new capabilities. Now, HNS “targets cross-platform database solutions and smart home devices,” according to a July 2018 Fortinet threat report.

Trend Micro discovered a new exploit in early July that uses the Android Debug Bridge (ADB) command line utility, which automatically listens on port 5555, to create a mining botnet. While the threat is currently limited in scope because ADB is turned off by default, Shodan, a search engine for IoT devices, turned up 48,000 exploitable devices.

Mirai-Based Attacks Persist Despite Rising Awareness of IoT Risks

Fortinet noted that HNS uses open source Mirai code to quickly adapt, leveraging a combination of copied code and creative inspiration to add features like code persistence after a reboot. The latest version of HNS also uses nine separate exploits to infect IoT devices.

The ADB threat, meanwhile, is seemingly linked to the Satori version of Mirai and was likely created by the same author, according to a July 2018 IBM X-Force threat advisory. This means that despite increased awareness of IoT threats, Mirai-based attacks are still in development — and still succeeding.

How Can Companies Mitigate the Risk of IoT Botnets?

To protect IoT environments from threats like Mirai, IBM experts recommend changing all default passwords and establishing an incident response team to “conduct regular gap analyses to monitor the data generated by connected devices.”

Organizations should also be aware of emerging Telnet trends in IoT botnets. After the Mirai attack, for example, the use of Telnet attack source rose by 140 percent. IBM X-Force researchers suggest limiting Telent use in corporate environments or replacing it with a stronger alternative like Secure Shell (SSH).

Sources: Fortinet, Trend Micro

More from

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today