SlideShare a Scribd company logo
Malware's Most Wanted: Linux and Internet of Things Malware
EXOTIC CREATURES
Internet of Things and Linux Malware
Your speakers today
Marion Marschalek
Security Research Expert
Shel Sharma
Product Marketing Director
Agenda
o Linux & IoT in the spotlight
o Cyphort Lab’s in-the-wild spottings
o Status of Linux & IoT malware
CyphortLabsT-shirt
Threat Monitoring &
Research team
________
24X7 monitoring for
malware events
________
Assist customers with
their Forensics and
Incident Response
We enhance malware
detection accuracy
________
False positives/negatives
________
Deep-dive research
We work with the
security ecosystem
________
Contribute to and learn
from malware KB
________
Best of 3rd Party threat
data
THE INTERNET
http://greendisc.dacya.ucm.es/wp-content/uploads/2014/10/Internet_of_Things.jpg
might be bigger than you thought
By broadening the internet surface...
http://datasciencebe.com/category/data-science-2/iot-analytics/
... we broaden our attack surface.
Internet
technology
in every
day life
WEAK
DEFAULT
SECURITY
LINUX & IoT MALWARE
ESPIONAGE GOES LINUX
o Suspected to be Russian government malware
o Active since 2008
o Linux component uncovered 2014
o Backdoor capabilities & stealthy C&C
communication
Turla‘s Linux component
LINUX MARKET SHARES
o Linux on desktop systems under 5%
o Public servers ~36%
o Mainframes >96%
o Embedded systems ~30%
INDUSTRIAL CONTROL SYSTEMS UNDER ATTACK
o Enumerates network resources
through Windows API
o OPC – OLE process control
o ICS spy:
o Network entities UNC paths
o Thereof OPC servers
o Server version
o OPC version support
o etc.
Havex on industrial espionage
BROADENING THE ATTACK SURFACE
More devices more attack vectors
IoT compromises
Hacked baby monitors and CCTV cameras in
UK
Smart meters vulnerable to attacks, could
harm national power network
‚Spike‘ botnet runs DoS attacks from IoT
devices
Linux risks
Servers and critical infrastructure based on
Unix distributions
Webservers as entry point to corporate
network
Major flaws in legacy open source software
show vulnerability of Linux systems
EXOTIC CREATURES
in the wild
CYPHORT LAB‘S IN-THE-WILD ENCOUNTERS
o Mayday | 10:2014
o Sotdas | 10:2014
o Snessik | 10:2014
o Ganiw | 10:2014
o SSHb | 11:2014
o Darlloz | 12:2014
o Zendran| 12:2014
LINUX.MAYDAY
o DDoS bot with task scheduler
o Comes packed with UPX
o C++ binary including object
information
o Contains a logger class for
categories:
INFO, DEBUG, FATAL and WARNING
LINUX.GANIWo Backdoor / DDoS bot
o Exfiltrates the following
information:
o OS name and version
o System’s MAC address
o Amount of RAM
o Number of network interfaces
o CPU usage and frequency
o Calculates stats on the
attacks it performs
o Kills instances of malware already present
LINUX.SOTDASo DDoS bot, no binary protection
o Target URL downloaded from C&C
o The following methods are supported:
o UDP flood
o TCP flood
o Syn flood
o DNS flood
o DIY with custom built
TCP and HTTP packets
o Shuts down iptables,
SuSEfirewall2 or ebtables services
LINUX.SNESSIK
o Backdoor / DDoS bot
o Spawns shells to execute commands from its botmaster
o Uses curl for file up-/download
o Data exchanged with C&C is BASE64 & XOR encoded
o The binary contains HTTP headers for US English and
Chinese
LINUX.SSHB
o Simple backdoor
o Enabling access to the machine through SSH
o Implementing source from OpenSSH
IoT WORM DARLLOZ
o Targets Linux distributions on routers, security cameras &
gaming systems
o Spreads by bruteforcing telnet logins or by exploiting PHP
vulnerability CVE-2012-1823
o Cross compiled for:
o arm
o ppc
o mipsel
o mips
o x86
o DDoS bot based on IRC based scanner
Lightaidra
o Cross-compiled for x86, x64,
PPC, MIPS, MIPSEL, ARM
and SuperH
o Comes packed with UPX
o Communicates to C&C via IRC
o 2 stages:
o Downloader script
o Platform specific binary
IoT BOT ZENDRAN
WHERE ARE WE NOW
and what does the future hold
EXOTIC CREATURE‘S FEATURES
Unprotected binaries
Low evasiveness
Lack of stealth
Binaries coming with symbols
A lot of source code re-use
Low AV detection
Consistently low default
security for Linux & IoT
Easy prey for attackers
Rising number of infections
REMEDIES
1. Network focussed security
2. Reviewing security settings of devices / machines
3. Regular updates and patches, where applicable
4. Network segmentation to counter lateral movement
Q and A
o Information sharing and
advanced threats resources
o Blogs on latest threats and
findings
o Tools for identifying malware
Thank You!
Malware's Most Wanted: Linux and Internet of Things Malware
FURTHER READING
o Havex attacks Industrial Control Systems
http://www.cyphort.com/windows-meets-industrial-control-systems-ics-havex-rat-spells-security-
risks-2/
o Baby monitors hacken in UK homes
http://www.independent.co.uk/life-style/gadgets-and-tech/baby-monitors-cctv-cameras-and-
webcams-from-uk-homes-and-businesses-hacked-and-uploaded-onto-russian-website-
9871830.html
o Smart meters vulnerable to attack
http://securityaffairs.co/wordpress/29353/security/smart-meters-hacking.html
o Spike botnet runs DoS attacks from IoT devices
http://securityaffairs.co/wordpress/28642/cyber-crime/spike-botnet-runs-ddos.html

More Related Content

PPTX
Malware's Most Wanted: Financial Trojans
PPTX
Understanding Malware Lateral Spread Used in High Value Attacks
PPTX
EverSec + Cyphort: Big Trends in Cybersecurity
PPTX
Malware's Most Wanted: The Many Faces of Malware
PPTX
MMW June 2016: The Rise and Fall of Angler
PPTX
MMW April 2016 Ransomware Resurgence
PPTX
Most notable apt_ attacks_of_2015_and_2016 predictions
PPTX
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Malware's Most Wanted: Financial Trojans
Understanding Malware Lateral Spread Used in High Value Attacks
EverSec + Cyphort: Big Trends in Cybersecurity
Malware's Most Wanted: The Many Faces of Malware
MMW June 2016: The Rise and Fall of Angler
MMW April 2016 Ransomware Resurgence
Most notable apt_ attacks_of_2015_and_2016 predictions
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.

What's hot (19)

PPTX
Mmw mac malware-mac
PPTX
Dissecting Cryptowall
PPTX
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
PPTX
Malware Most Wanted: Evil Bunny
PPTX
Malware self protection-matrix
PPTX
Malware Most Wanted: Security Ecosystem
PPTX
Cybersecurity 5 road_blocks
PPTX
Cyber espionage nation state-apt_attacks_on_the_rise
PPTX
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
PPTX
MMW Anti-Sandbox Techniques
PPTX
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
PDF
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
PDF
CSF18 - Guarding Against the Unknown - Rafael Narezzi
PDF
IT Security landscape and the latest threats and trends
PDF
Wannacry | Technical Insight and Lessons Learned
PPTX
Ransomware the clock is ticking
PPTX
Ransomware: Mitigation Through Preparation
PDF
42 - Malware - Understand the Threat and How to Respond
PPTX
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Mmw mac malware-mac
Dissecting Cryptowall
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware Most Wanted: Evil Bunny
Malware self protection-matrix
Malware Most Wanted: Security Ecosystem
Cybersecurity 5 road_blocks
Cyber espionage nation state-apt_attacks_on_the_rise
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
MMW Anti-Sandbox Techniques
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - Guarding Against the Unknown - Rafael Narezzi
IT Security landscape and the latest threats and trends
Wannacry | Technical Insight and Lessons Learned
Ransomware the clock is ticking
Ransomware: Mitigation Through Preparation
42 - Malware - Understand the Threat and How to Respond
Malware’s Most Wanted: NightHunter. A Massive Campaign to Steal Credentials R...
Ad

Similar to Malware's Most Wanted: Linux and Internet of Things Malware (20)

PDF
Tsunami of Technologies. Are we prepared?
PDF
Palestra Jeferson Propheta - Wanna Cry more
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
Panda Security - Endpoint Protection
PDF
UQ_Cybercrime_Professionalism_Lecture_2024_07.pdf
PPTX
The Log4Shell Vulnerability – explained: how to stay secure
PDF
Internet of Things - Privacy and Security issues
PPTX
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
PDF
PDF
Malware freak show
PDF
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
PPTX
beware of Thing Bot
PPTX
News bytes Sept-2011
PDF
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
PDF
IoT Security, Mirai Revisited
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PPTX
Final project.ppt
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PPTX
IDS+Honeypots Making Security Simple
Tsunami of Technologies. Are we prepared?
Palestra Jeferson Propheta - Wanna Cry more
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Panda Security - Endpoint Protection
UQ_Cybercrime_Professionalism_Lecture_2024_07.pdf
The Log4Shell Vulnerability – explained: how to stay secure
Internet of Things - Privacy and Security issues
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
Malware freak show
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
beware of Thing Bot
News bytes Sept-2011
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
IoT Security, Mirai Revisited
FBI & Secret Service- Business Email Compromise Workshop
Final project.ppt
Disruptionware-TRustedCISO103020v0.7.pptx
IDS+Honeypots Making Security Simple
Ad

More from Cyphort (12)

PPTX
MMW June 2016: The Rise and Fall of Angler
PPTX
Machine learning cyphort_malware_most_wanted
PPTX
Mmw anti sandbox_techniques
PPTX
Mmw anti sandboxtricks
PDF
If you have three wishes
PDF
The A and the P of the T
PPTX
Malware's Most Wanted: How to tell BADware from adware
PPTX
Zeus Dissected
PDF
ISC2014 Beijing Keynote
PPTX
Malware's Most Wanted (MMW): Backoff POS Malware
PPTX
Malware's most wanted-zberp-the_financial_trojan
PDF
Digging deeper into the IE vulnerability CVE-2014-1776 with Cyphort
MMW June 2016: The Rise and Fall of Angler
Machine learning cyphort_malware_most_wanted
Mmw anti sandbox_techniques
Mmw anti sandboxtricks
If you have three wishes
The A and the P of the T
Malware's Most Wanted: How to tell BADware from adware
Zeus Dissected
ISC2014 Beijing Keynote
Malware's Most Wanted (MMW): Backoff POS Malware
Malware's most wanted-zberp-the_financial_trojan
Digging deeper into the IE vulnerability CVE-2014-1776 with Cyphort

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Machine Learning_overview_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Spectroscopy.pptx food analysis technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Diabetes mellitus diagnosis method based random forest with bat algorithm
A comparative analysis of optical character recognition models for extracting...
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
Machine Learning_overview_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Assigned Numbers - 2025 - Bluetooth® Document
Spectroscopy.pptx food analysis technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Malware's Most Wanted: Linux and Internet of Things Malware

  • 2. EXOTIC CREATURES Internet of Things and Linux Malware
  • 3. Your speakers today Marion Marschalek Security Research Expert Shel Sharma Product Marketing Director
  • 4. Agenda o Linux & IoT in the spotlight o Cyphort Lab’s in-the-wild spottings o Status of Linux & IoT malware CyphortLabsT-shirt
  • 5. Threat Monitoring & Research team ________ 24X7 monitoring for malware events ________ Assist customers with their Forensics and Incident Response We enhance malware detection accuracy ________ False positives/negatives ________ Deep-dive research We work with the security ecosystem ________ Contribute to and learn from malware KB ________ Best of 3rd Party threat data
  • 7. By broadening the internet surface... http://datasciencebe.com/category/data-science-2/iot-analytics/ ... we broaden our attack surface.
  • 10. LINUX & IoT MALWARE
  • 11. ESPIONAGE GOES LINUX o Suspected to be Russian government malware o Active since 2008 o Linux component uncovered 2014 o Backdoor capabilities & stealthy C&C communication Turla‘s Linux component
  • 12. LINUX MARKET SHARES o Linux on desktop systems under 5% o Public servers ~36% o Mainframes >96% o Embedded systems ~30%
  • 13. INDUSTRIAL CONTROL SYSTEMS UNDER ATTACK o Enumerates network resources through Windows API o OPC – OLE process control o ICS spy: o Network entities UNC paths o Thereof OPC servers o Server version o OPC version support o etc. Havex on industrial espionage
  • 14. BROADENING THE ATTACK SURFACE More devices more attack vectors IoT compromises Hacked baby monitors and CCTV cameras in UK Smart meters vulnerable to attacks, could harm national power network ‚Spike‘ botnet runs DoS attacks from IoT devices Linux risks Servers and critical infrastructure based on Unix distributions Webservers as entry point to corporate network Major flaws in legacy open source software show vulnerability of Linux systems
  • 16. CYPHORT LAB‘S IN-THE-WILD ENCOUNTERS o Mayday | 10:2014 o Sotdas | 10:2014 o Snessik | 10:2014 o Ganiw | 10:2014 o SSHb | 11:2014 o Darlloz | 12:2014 o Zendran| 12:2014
  • 17. LINUX.MAYDAY o DDoS bot with task scheduler o Comes packed with UPX o C++ binary including object information o Contains a logger class for categories: INFO, DEBUG, FATAL and WARNING
  • 18. LINUX.GANIWo Backdoor / DDoS bot o Exfiltrates the following information: o OS name and version o System’s MAC address o Amount of RAM o Number of network interfaces o CPU usage and frequency o Calculates stats on the attacks it performs o Kills instances of malware already present
  • 19. LINUX.SOTDASo DDoS bot, no binary protection o Target URL downloaded from C&C o The following methods are supported: o UDP flood o TCP flood o Syn flood o DNS flood o DIY with custom built TCP and HTTP packets o Shuts down iptables, SuSEfirewall2 or ebtables services
  • 20. LINUX.SNESSIK o Backdoor / DDoS bot o Spawns shells to execute commands from its botmaster o Uses curl for file up-/download o Data exchanged with C&C is BASE64 & XOR encoded o The binary contains HTTP headers for US English and Chinese
  • 21. LINUX.SSHB o Simple backdoor o Enabling access to the machine through SSH o Implementing source from OpenSSH
  • 22. IoT WORM DARLLOZ o Targets Linux distributions on routers, security cameras & gaming systems o Spreads by bruteforcing telnet logins or by exploiting PHP vulnerability CVE-2012-1823 o Cross compiled for: o arm o ppc o mipsel o mips o x86
  • 23. o DDoS bot based on IRC based scanner Lightaidra o Cross-compiled for x86, x64, PPC, MIPS, MIPSEL, ARM and SuperH o Comes packed with UPX o Communicates to C&C via IRC o 2 stages: o Downloader script o Platform specific binary IoT BOT ZENDRAN
  • 24. WHERE ARE WE NOW and what does the future hold
  • 25. EXOTIC CREATURE‘S FEATURES Unprotected binaries Low evasiveness Lack of stealth Binaries coming with symbols A lot of source code re-use Low AV detection Consistently low default security for Linux & IoT Easy prey for attackers Rising number of infections
  • 26. REMEDIES 1. Network focussed security 2. Reviewing security settings of devices / machines 3. Regular updates and patches, where applicable 4. Network segmentation to counter lateral movement
  • 27. Q and A o Information sharing and advanced threats resources o Blogs on latest threats and findings o Tools for identifying malware
  • 30. FURTHER READING o Havex attacks Industrial Control Systems http://www.cyphort.com/windows-meets-industrial-control-systems-ics-havex-rat-spells-security- risks-2/ o Baby monitors hacken in UK homes http://www.independent.co.uk/life-style/gadgets-and-tech/baby-monitors-cctv-cameras-and- webcams-from-uk-homes-and-businesses-hacked-and-uploaded-onto-russian-website- 9871830.html o Smart meters vulnerable to attack http://securityaffairs.co/wordpress/29353/security/smart-meters-hacking.html o Spike botnet runs DoS attacks from IoT devices http://securityaffairs.co/wordpress/28642/cyber-crime/spike-botnet-runs-ddos.html

Editor's Notes

  • #6: About Cyphort Labs
  • #13: Overlap with IoT
  • #31: More links