Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3407023.3409177acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Disposable botnets: examining the anatomy of IoT botnet infrastructure

Published: 25 August 2020 Publication History

Abstract

Large botnets made up of Internet-of-Things (IoT) devices have been a steady presence in the threat landscape since 2016. Earlier research has found preliminary evidence that the IoT binaries and C&C infrastructure were only seen for very brief periods. It has not explained how attackers maintain control over their botnets. We present a more comprehensive analysis of the infrastructure of IoT botnets based on 23 months of data gathered via honeypots and the monitoring of botnet infrastructure. We collected 59,884 IoT malware samples, 35,494 download servers, and 2,747 C&C servers. We focuse on three dominant families: Bashlite, Mirai, and Tsunami. The picture that emerges is that of highly disposable botnets. IoT botnet are not so much maintained as reconstituted from scratch all the time. Not only are most binaries distributed for less than three days, the connection of bots to the rest of the botnet is also short-lived. To reach the C&C server, the binaries typically contain only a single hard-coded IP address or domain. The C&C servers themselves also have a short lifespan. Long-term dynamic analysis finds no mechanism for the attackers to migrate the bots to a new C&C server. In other words, bots are used only immediately after capture and then abandoned---perhaps to be recaptured again via the aggressive scanning practices that these botnets are known for. While IoT botnets appear less advanced than Windows-based botnets, the advantage of being disposable means that they are very resistant to blacklisting and C&C takedown. Most IP addresses are used only once and never seen again. The question that arises is how attackers source these addresses. We speculate that they might be abusing the IP address allocation practices of cloud providers.

References

[1]
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093--1110.
[2]
Ryan Barnett. 2018. New Tsunami/Kaiten Variant: Propagation Status - Akamai Security Intelligence and Threat Research Blog. https://blogs.akamai.com/sitr/2018/09/new-tsunamikaiten-variant-propagation-status.html
[3]
Gabriel Bastos, Artur Marzano, Osvaldo Fonseca, Elverton Fazzion, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H.P.C. Chaves, Italo Cunha, Dorgival Guedes, and Wagner Meira Jr. 2019. Identifying and Characterizing Bashlite and Mirai C2C Servers. In ISCC 2019. Barcelona, Spain.
[4]
Jeff Bernstein and Tim Spets. 2004. CPE WAN management protocol. In DSL Forum, Tech. Rep. TR-069.
[5]
Hugo LJ Bijmans, Tim M Booij, and Christian Doerr. 2019. Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking. In ACM SIGSAC Conference on Computer and Communications Security. 449--464.
[6]
360 Netlab Blog. 2018. Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address. https://blog.netlab.360.com/art-of-steal-satori-variant-is-robbing-eth-bitcoin-by-replacing-wallet-address-en/
[7]
Orcun Cetin, Carlos Ga nán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, and Michel van Eeten. 2019. Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. In NDSS 2019.
[8]
Igor Daniloff. 2019. Doctor Web. https://www.drweb.com
[9]
Michele De Donno, Nicola Dragoni, Alberto Giaretta, and Angelo Spognardi. 2017. Analysis of DDoS-Capable IoT Malwares. In Federated Conference on Computer Science and Information Systems.
[10]
Sam Edwards and Ioannis Profetis. 2016. Hajime: Analysis of a decentralized internet worm for IoT devices. Rapidity Networks 16 (2016).
[11]
Fortinet. 2018. DDoS-for-Hire Service Powered by Bushido Botnet. https://www.fortinet.com/blog/threat-research/ddos-for-hire-service-powered-by-bushido-botnet-.html
[12]
Max Goncharov. 2015. Criminal hideouts for lease: Bulletproof hosting services. https://www.trendmicro.no/media/wp/wp-criminal-hideouts-for-lease-en.pdf
[13]
Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martin Ochoa, Nils Tippenhauer, Asaf Shabtai, and Yuval Elovici. 2019. Siphon: Towards scalable high-interaction physical honeypots. In CPSS 2019.
[14]
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, and Dave Levin. 2019. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet. In The Network and Distributed System Security Symposium (NDSS 2019).
[15]
Hex-Rays. 2019. IDA Pro. https://www.hex-rays.com/products/ida/
[16]
IP2Location.com. 2018. IP2Location. https://www.ip2location.com/
[17]
Sheharbano Khattak, Naurin Rasheed Ramay, Kamran Riaz Khan, Affan A. Syed, and Syed Ali Khayam. 2013. A Taxonomy of Botnet Behavior, Detection and Defense. In IEEE Communications Surveys and Tutorials.
[18]
Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane CM Moura, and Cristian Hesselman. 2017. Statistical Analysis of DNS Abuse in gTLDs Final Report. Technical Report. Technical Report. https://www.icann.org/en/system/files/files/sadag-final.
[19]
Brian Krebs. 2017. Who is Anna-Senpai, the Mirai Worm Author? https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/
[20]
Artur Marzano, David Alexander, Osvaldo Fonseca, Elverton Fazzion, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. C. Chaves, Dorgival Guedes Italo Cunh and, and Wagner Meira Jr. 2018. The Evolution of Bashlit and Mirai IoT Botnet. In IEEE Symposium on Computers and Communications (ISCC 2018).
[21]
Maxmind. 2019. GeoIP2 Databases. https://www.maxmind.com/
[22]
Krebs on Security. 2017. Mirai IoT Botnet Co-Authors Plead Guilty. https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/
[23]
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2015. IoTPOT: Analysing the Rise of IoT Compromises. In 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, Washington, D.C.
[24]
Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi. 2019. Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild. In ARES 2019.
[25]
Farsight Security. 2018. DNSDB. https://www.dnsdb.info/
[26]
Tom Spring, K Carpenter, and M Mimoso. 2016. BASHLITE family of Malware Infects 1 Million IoT devices. Threat Post (2016).
[27]
Jornt van der Wiel, Vicente Diaz, Yury Namestnikov, and Zykov Konstantin. 2017. Hajime, the mysterious evolving botnet. https://securelist.com/hajime-the-mysterious-evolving-botnet/78160/
[28]
Pierre-Antoine Vervier and Yun Shen. 2018. Before Toasters Rise Up: A View Into the EmergingIoT Threat Landscape. In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018). Springer, Heraklion, Crete, Greece, 556--576.
[29]
Meng Wang, Javier Santillan, and Fernando Kuipers. 2018. ThingPot: an interactive IoT honeypot. arXiv:1807.04114
[30]
GenShen Ye. 2019. Hunting advanced IoT malware. In The 22nd International AVAR cybersecurity conference. https://www.avar2019.org/agenda/day-1/hunting-advanced-iot-malware
[31]
ZDNet. 2019. Hacker leaks passwords for more than 500,000 servers, routers, and IoT devices. https://www.zdnet.com/article/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices/.

Cited By

View all
  • (2024)C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644992(112-127)Online publication date: 1-Jul-2024
  • (2022)A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home EnvironmentApplied Sciences10.3390/app12221185312:22(11853)Online publication date: 21-Nov-2022
  • (2022)Disposable Botnets: Long-term Analysis of IoT Botnet InfrastructureJournal of Information Processing10.2197/ipsjjip.30.57730(577-590)Online publication date: 2022
  • Show More Cited By

Index Terms

  1. Disposable botnets: examining the anatomy of IoT botnet infrastructure

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
      August 2020
      1073 pages
      ISBN:9781450388337
      DOI:10.1145/3407023
      • Program Chairs:
      • Melanie Volkamer,
      • Christian Wressnegger
      © 2020 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 August 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. C&C server
      2. IoT honeypot
      3. IoT malware binary
      4. internet-of-things

      Qualifiers

      • Research-article

      Funding Sources

      • SIDN
      • Dutch Research Council (NWO)

      Conference

      ARES 2020

      Acceptance Rates

      Overall Acceptance Rate 228 of 451 submissions, 51%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)54
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644992(112-127)Online publication date: 1-Jul-2024
      • (2022)A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home EnvironmentApplied Sciences10.3390/app12221185312:22(11853)Online publication date: 21-Nov-2022
      • (2022)Disposable Botnets: Long-term Analysis of IoT Botnet InfrastructureJournal of Information Processing10.2197/ipsjjip.30.57730(577-590)Online publication date: 2022
      • (2022)MalNetProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561463(472-487)Online publication date: 25-Oct-2022
      • (2022) Dark-TRACER : Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns IEEE Access10.1109/ACCESS.2022.314596610(13038-13058)Online publication date: 2022
      • (2022)INC: In-Network Classification of Botnet Propagation at Line RateComputer Security – ESORICS 202210.1007/978-3-031-17140-6_27(551-569)Online publication date: 25-Sep-2022
      • (2021)NURSE: eNd-UseR IoT malware detection tool for Smart homEsProceedings of the 11th International Conference on the Internet of Things10.1145/3494322.3494340(134-142)Online publication date: 8-Nov-2021
      • (2021)DisCo: Combining Disassemblers for Improved PerformanceProceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3471621.3471851(148-161)Online publication date: 6-Oct-2021
      • (2021)A Survey on Resilience in the IoTACM Computing Surveys10.1145/346251354:7(1-39)Online publication date: 17-Sep-2021
      • (2021)Automated Detection of Malware Activities Using Nonnegative Matrix Factorization2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom53373.2021.00085(548-556)Online publication date: Oct-2021
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media