Skip to content

Instantly share code, notes, and snippets.

@paddykontschak
Created March 12, 2017 14:36
Show Gist options
  • Save paddykontschak/2b2d2469ec33d82fb69335e5a932b439 to your computer and use it in GitHub Desktop.
Save paddykontschak/2b2d2469ec33d82fb69335e5a932b439 to your computer and use it in GitHub Desktop.

Mirai Botnot

Summary

  • Mirai is a piece of malicious Software used to create large botnets
  • Targets IoT devices and routers
  • 360k bots at peak efficiency

Examples

  • Popular security expert demonstrates infection on IoT security camera on Twitter
  • Results are surprising
  • Botnet created within 96 seconds

How does Mirai work

  • Tries to connect via telnet
  • Downloads the Bot
  • Secures its position
  • Waits for commands
  • Scans for other devices to spread to

Another example

  • Mirai botnet attacking Dyn DNS and disrupted access to many major webservices

Staying Safe

  • Change default device password and use unique and complex password
  • Keep your devices at home
  • Check for "Universal Plug and Play" features and turn these off
  • Check software updates and patches
  • Don't let telnetd run openly by default
  • Ask the users not to serve SSH in the default ports

Sources

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment