Disposable botnets: examining the anatomy of IoT botnet infrastructure

Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, K. Yoshioka, Tsutomu Matsumoto, C. Gañán, M. V. Eeten
{"title":"Disposable botnets: examining the anatomy of IoT botnet infrastructure","authors":"Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, K. Yoshioka, Tsutomu Matsumoto, C. Gañán, M. V. Eeten","doi":"10.1145/3407023.3409177","DOIUrl":null,"url":null,"abstract":"Large botnets made up of Internet-of-Things (IoT) devices have been a steady presence in the threat landscape since 2016. Earlier research has found preliminary evidence that the IoT binaries and C&C infrastructure were only seen for very brief periods. It has not explained how attackers maintain control over their botnets. We present a more comprehensive analysis of the infrastructure of IoT botnets based on 23 months of data gathered via honeypots and the monitoring of botnet infrastructure. We collected 59,884 IoT malware samples, 35,494 download servers, and 2,747 C&C servers. We focuse on three dominant families: Bashlite, Mirai, and Tsunami. The picture that emerges is that of highly disposable botnets. IoT botnet are not so much maintained as reconstituted from scratch all the time. Not only are most binaries distributed for less than three days, the connection of bots to the rest of the botnet is also short-lived. To reach the C&C server, the binaries typically contain only a single hard-coded IP address or domain. The C&C servers themselves also have a short lifespan. Long-term dynamic analysis finds no mechanism for the attackers to migrate the bots to a new C&C server. In other words, bots are used only immediately after capture and then abandoned---perhaps to be recaptured again via the aggressive scanning practices that these botnets are known for. While IoT botnets appear less advanced than Windows-based botnets, the advantage of being disposable means that they are very resistant to blacklisting and C&C takedown. Most IP addresses are used only once and never seen again. The question that arises is how attackers source these addresses. We speculate that they might be abusing the IP address allocation practices of cloud providers.","PeriodicalId":121225,"journal":{"name":"Proceedings of the 15th International Conference on Availability, Reliability and Security","volume":"220 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 15th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3407023.3409177","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Large botnets made up of Internet-of-Things (IoT) devices have been a steady presence in the threat landscape since 2016. Earlier research has found preliminary evidence that the IoT binaries and C&C infrastructure were only seen for very brief periods. It has not explained how attackers maintain control over their botnets. We present a more comprehensive analysis of the infrastructure of IoT botnets based on 23 months of data gathered via honeypots and the monitoring of botnet infrastructure. We collected 59,884 IoT malware samples, 35,494 download servers, and 2,747 C&C servers. We focuse on three dominant families: Bashlite, Mirai, and Tsunami. The picture that emerges is that of highly disposable botnets. IoT botnet are not so much maintained as reconstituted from scratch all the time. Not only are most binaries distributed for less than three days, the connection of bots to the rest of the botnet is also short-lived. To reach the C&C server, the binaries typically contain only a single hard-coded IP address or domain. The C&C servers themselves also have a short lifespan. Long-term dynamic analysis finds no mechanism for the attackers to migrate the bots to a new C&C server. In other words, bots are used only immediately after capture and then abandoned---perhaps to be recaptured again via the aggressive scanning practices that these botnets are known for. While IoT botnets appear less advanced than Windows-based botnets, the advantage of being disposable means that they are very resistant to blacklisting and C&C takedown. Most IP addresses are used only once and never seen again. The question that arises is how attackers source these addresses. We speculate that they might be abusing the IP address allocation practices of cloud providers.
一次性僵尸网络:检查物联网僵尸网络基础设施的解剖结构
自2016年以来,由物联网(IoT)设备组成的大型僵尸网络一直是威胁领域的稳定存在。早期的研究发现,初步证据表明,物联网二进制文件和C&C基础设施只存在很短的时间。它没有解释攻击者如何保持对僵尸网络的控制。我们根据23个月来通过蜜罐收集的数据和对僵尸网络基础设施的监测,对物联网僵尸网络的基础设施进行了更全面的分析。我们收集了59,884个物联网恶意软件样本,35,494个下载服务器和2,747个C&C服务器。我们专注于三个主要的家族:Bashlite、Mirai和Tsunami。出现的画面是高度一次性的僵尸网络。物联网僵尸网络的维护并不多,而是从头开始重建。不仅大多数二进制文件的分发时间不到三天,机器人与僵尸网络其余部分的连接也很短暂。要到达C&C服务器,二进制文件通常只包含一个硬编码的IP地址或域。C&C服务器本身的生命周期也很短。长期动态分析没有发现攻击者将机器人迁移到新的C&C服务器的机制。换句话说,僵尸程序只会在捕获后立即使用,然后被丢弃——也许会通过这些僵尸网络众所周知的积极扫描实践再次被捕获。虽然物联网僵尸网络似乎不如基于windows的僵尸网络先进,但一次性的优势意味着它们非常抵抗黑名单和C&C删除。大多数IP地址只使用一次,再也不会出现。出现的问题是攻击者如何获取这些地址。我们推测他们可能正在滥用云提供商的IP地址分配做法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信