DDOS

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet’s C&C server targeting Japan and other countries since late 2024.

These commands targeted various companies, which include major Japanese corporations and banks. 

While a direct link cannot be confirmed, some targeted organizations reported temporary connection and network disruptions during this period that coincided with the observed attack commands. 

Emerging Threats from IoT Botnets Focusing on Japan

This Mirai/Bashlite-based botnet exploits RCE vulnerabilities or weak passwords to infect IoT devices. The infection stages involve downloading a script that fetches a loader executable from a distribution server. 

After that, the loader uses a specialized User-Agent header to successfully retrieve the actual malware payload from the server and then executes it in memory. 

The malware communicates with the C&C server for commands to launch DDoS attacks (SYN Flood, TCP ACK Flood, UDP Flood, etc.) or transform the device into a proxy server.  

A code to download binaries from the distribution server with custom User-Agent header

It employs several evasion techniques and deactivates the watchdog timer that hinders system restarts triggered by high loads during DDoS attacks by mirroring past Mirai botnet behavior. 

It also manipulates iptables rules to hinder infection detection and DDoS attack visibility. By blocking WAN-side TCP connections, it aims to prevent cross-infection while maintaining internal management access. 

Through the use of dynamically configured iptables rules, the malicious software is able to receive UDP packets from the outside world and suppress TCP RST packets by concealing its activities.

Malware code to disable the Watchdog timer

DDoS attacks observed between December 27, 2024, and January 4, 2025 have targeted organizations across North America, Europe, and Asia, with a concentration in the United States, Bahrain, and Poland. 

The Trend Micro analysis revealed distinct command patterns depending on the target region. Attacks against Japanese targets frequently employed the “stomp” command, while “gre” was more common for international targets. 

They targeted the transportation, information and communication, and finance and insurance sectors, while international attacks primarily focused on the information and communication and finance and insurance industries, with a notable absence of attacks targeting the transportation sector. 

Targeted Industries

The actor behind these attacks demonstrated adaptability and tested new commands like “socket” and “handshake” against Japanese organizations after initial defenses were implemented.

The iptables rules that the malware set in the initialization phase

Analysis of a botnet revealed 348 compromised devices, primarily wireless routers (80%) from vendors like TP-Link and Zyxel while IP cameras particularly from Hikvision have also contributed significantly. 

Factors contributing to their exploitation include the persistence of default settings, outdated firmware, and inadequate security features that enable attackers to easily compromise these devices and leverage them for malicious activities like DDoS attacks and network intrusions.

Mitigation Strategies Against DDoS Attacks and IoT Vulnerabilities

To mitigate botnet infections and DDoS attacks, implement robust security measures. Secure IoT devices by changing default credentials, updating firmware regularly, and segmenting IoT networks. 

Restrict remote access, manage devices effectively, and monitor network traffic for anomalies.

Mitigate UDP floods by blocking specific IP addresses and protocols, collaborating with service providers, and strengthening router hardware. 

Investigate Real-World Malicious Links & Phishing Attacks With ANY.RUN Malware Sandbox - Try 14 Days Free Trial

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release of…

1 day ago

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the…

2 days ago

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help organizations…

2 days ago

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been patched,…

2 days ago

Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access

A newly disclosed spoofing vulnerability (CVE-2025-26685) in Microsoft Defender for Identity (MDI) enables unauthenticated attackers…

2 days ago

Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic

A critical vulnerability (CVE-2025-6031) has been identified in Amazon Cloud Cam devices, which reached end-of-life…

2 days ago