DDOS

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet’s C&C server targeting Japan and other countries since late 2024.

These commands targeted various companies, which include major Japanese corporations and banks. 

While a direct link cannot be confirmed, some targeted organizations reported temporary connection and network disruptions during this period that coincided with the observed attack commands. 

Emerging Threats from IoT Botnets Focusing on Japan

This Mirai/Bashlite-based botnet exploits RCE vulnerabilities or weak passwords to infect IoT devices. The infection stages involve downloading a script that fetches a loader executable from a distribution server. 

After that, the loader uses a specialized User-Agent header to successfully retrieve the actual malware payload from the server and then executes it in memory. 

The malware communicates with the C&C server for commands to launch DDoS attacks (SYN Flood, TCP ACK Flood, UDP Flood, etc.) or transform the device into a proxy server.  

A code to download binaries from the distribution server with custom User-Agent header

It employs several evasion techniques and deactivates the watchdog timer that hinders system restarts triggered by high loads during DDoS attacks by mirroring past Mirai botnet behavior. 

It also manipulates iptables rules to hinder infection detection and DDoS attack visibility. By blocking WAN-side TCP connections, it aims to prevent cross-infection while maintaining internal management access. 

Through the use of dynamically configured iptables rules, the malicious software is able to receive UDP packets from the outside world and suppress TCP RST packets by concealing its activities.

Malware code to disable the Watchdog timer

DDoS attacks observed between December 27, 2024, and January 4, 2025 have targeted organizations across North America, Europe, and Asia, with a concentration in the United States, Bahrain, and Poland. 

The Trend Micro analysis revealed distinct command patterns depending on the target region. Attacks against Japanese targets frequently employed the “stomp” command, while “gre” was more common for international targets. 

They targeted the transportation, information and communication, and finance and insurance sectors, while international attacks primarily focused on the information and communication and finance and insurance industries, with a notable absence of attacks targeting the transportation sector. 

Targeted Industries

The actor behind these attacks demonstrated adaptability and tested new commands like “socket” and “handshake” against Japanese organizations after initial defenses were implemented.

The iptables rules that the malware set in the initialization phase

Analysis of a botnet revealed 348 compromised devices, primarily wireless routers (80%) from vendors like TP-Link and Zyxel while IP cameras particularly from Hikvision have also contributed significantly. 

Factors contributing to their exploitation include the persistence of default settings, outdated firmware, and inadequate security features that enable attackers to easily compromise these devices and leverage them for malicious activities like DDoS attacks and network intrusions.

Mitigation Strategies Against DDoS Attacks and IoT Vulnerabilities

To mitigate botnet infections and DDoS attacks, implement robust security measures. Secure IoT devices by changing default credentials, updating firmware regularly, and segmenting IoT networks. 

Restrict remote access, manage devices effectively, and monitor network traffic for anomalies.

Mitigate UDP floods by blocking specific IP addresses and protocols, collaborating with service providers, and strengthening router hardware. 

Investigate Real-World Malicious Links & Phishing Attacks With ANY.RUN Malware Sandbox - Try 14 Days Free Trial

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…

12 hours ago

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…

12 hours ago

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…

12 hours ago

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…

12 hours ago

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…

15 hours ago

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…

15 hours ago