New digital ‘hurricane’ churns, gathering strength to land blow on the Internet

  • TECH
  • Tuesday, 31 Oct 2017

A map compiled by British company Malware Tech displays the geographical distribution of the WannaCry ransomware cyber-attack over the past 24 hours on May 12, 2017, as seen on a computer screen in Portland Ore. (Alex Milan Tracy/Sipa USA/TNS)

WASHINGTON: Just as hurricane trackers chart storms in the Atlantic before they make landfall, cybersecurity researchers track viral infections that threaten mayhem. They've found a doozy. 

A massive zombie robotic network, or botnet, has expanded to infect "an estimated million organizations" and could bring corners of the internet to its knees, an Israeli cybersecurity company, Check Point Software, says. 

"The next cyber hurricane is about to come," Check Point says. 

Several cybersecurity researchers Monday confirmed Check Point's findings, saying the botnet could replicate, and perhaps dwarf, the Mirai botnet that almost exactly a year ago took down major websites on the Atlantic Coast, crippling a part of the internet's backbone and slowing traffic to a crawl. 

The botnet, which has been named either "Reaper" or "IoTroop," was first detected in mid-September. A Chinese cybersecurity firm, Qihoo 360, says the botnet is swelling by 10,000 devices a day, forcibly recruiting foot soldiers in an ever-larger invisible rogue army. 

Cybercrime gangs form botnets by infecting internet-enabled devices, often wireless cameras or routers with weak security features. Once corralled, controllers can send commands for the botnet to overwhelm a target, knocking its website off line or crippling the Internet. 

The new botnet has spread across the United States, Australia and other parts of the globe, researchers say, although Check Point notes that "it is too early to assess the intentions" of those propagating the infection. 

"It could be something that's meant to create global chaos," Maya Horowitz, threat intelligence group manager at Check Point, said in a telephone interview from Israel. "But it could be something that's more targeted," perhaps aimed at a country or industry. 

She said it is unlikely that cybersecurity experts will be able to halt an eventual attack. 

"The chances are pretty low for that," Horowitz said, adding that like an epidemic of infectious disease, "each infected device is looking for other devices to compromise." 

Criminal hackers are assembling increasingly powerful botnets. 

"They are getting bigger and badder," said Robert Hamilton, director of marketing at Imperva Incapsula, a Redwood Shores, California, cybersecurity firm that offers technology to mitigate botnet attacks. 

"The motive more than ever is money," he said, adding that criminal gangs send ransom demands to companies threatening to hit them with a distributed denial-of-service, or DDoS, attack unless paid off. 

"We had a client that received a letter that said 'if you don't pay us, we are going to bring your websites down with a DDoS attack,'" Hamilton said. "This was a client that you'd definitely recognize their name," declining to specify the company. 

Last year's Mirai botnet attack hit Dyn, a New Hampshire company that provides backbone services for the internet. Imperva says it found 49,657 infected devices spread over 164 countries. The top infected countries were Vietnam, Brazil and the United States. 

Scores of major companies were hit in that Oct. 21, 2016, attack, including Netflix, Twitter, Spotify, HBO, Amazon, CNN, and Comcast. 

The new botnet is based on the source code for Mirai, Horowitz said, "but about 100 different functions have been added ... and it has the potential to reach many, many more devices." 

The malware creating the botnet is infecting a variety of Internet of Things (IoT) devices but has been found with functions to target networking gear or routers manufactured by D-Link, TP-Link, AVTECH, NETGEAR, MikroTik, Linksys and Synology, Check Point said. 

"Since Reaper is exploiting a number of known vulnerabilities in different IoT devices, this botnet could definitely be much more disruptive than Mirai," said Merike Kaeo, chief technology officer at Farsight Security, a San Mateo, California, cybersecurity firm. "Known security issues in cameras, televisions, home routers, and any other internet-connected devices need to be addressed and fixed." 

Consumers can do their bit by checking to ensure that "all of their Internet-connected devices, especially home routers, have the latest firmware upgrades and security patches installed," Kaeo said. — McClatchy Washington Bureau/Tribune News Service

Article type: metered
User Type: anonymous web
User Status:
Campaign ID: 1
Cxense type: free
User access status: 3
Subscribe now to our Premium Plan for an ad-free and unlimited reading experience!

Next In Tech News

Galaxy wins bid for collapsed crypto lender Celsius' GK8 unit
Uber, Aurora to expand self-driving truck ops in Texas to meet holiday rush
India extends deadline to levy cap on digital payment transactions
Silicon Valley startup beaming electricity wirelessly raises $30 million
What were the most popular videos on YouTube in the United States this year?
Ukrainian engineers scramble to keep mobile phones working
Binance pauses Ankr withdrawals after possible token hack
Apple renames mixed-reality software ‘xrOS’ in sign headset is approaching
Crypto scammer in 'geniuses’ hack gets 18 months in prison
MCMC expedites review of online content management framework to combat fake news, extreme ideologies

Others Also Read