You are on page 1of 5

An Evaluation of IoT DDoS Cryptojacking Malware

and Mirai Botnet


Adam Borys Abu Kamruzzaman Hasnain Nizam Thakur Joseph C. Brickley
Department of IS and Statistics Department of IS and Statistics Mathematics and Natural Science Department of Civil Security
Baruch College/CUNY Baruch College/CUNY Brac University New Jersey City University
NY 10010, USA NY 10010, USA Dhaka, Bangladesh NJ 07305, USA
adamborys@baruchmail.cuny.ed abu.kamruzzaman@baruch.cuny. hasnain.nizam.thakur@g.bracu.ac jbrickley@njcu.edu
u edu .bd

Md L. Ali Kutub Thakur


Computer Science and Physics Professional Security Studies
Rider University New Jersey City University
NJ 08648, USA NJ 07305, USA
mdali@rider.edu kthakur@njcu.edu
2022 IEEE World AI IoT Congress (AIIoT) | 978-1-6654-8453-4/22/$31.00 ©2022 IEEE | DOI: 10.1109/AIIOT54504.2022.9817163

Abstract—This paper dives into the growing world of IoT viable for creating floods. Since 2016 Mirai has been studied
botnets that have taken the world by storm in the past five years. greatly and has also consequently caused new variants to release
Though alone an IP camera cannot produce enough traffic to be such as Anime and Qbot. Many of the attack and variants being
considered a DDoS. But a botnet that has over 150,000 connected created have included cryptomining malware citing the growing
IP cameras can generate as much as 1 Tbps in traffic. Botnets popularity of mining functions in new malwares.
catch many by surprise because their attacks and infections may
not be as apparent as a DDoS, some other cases include using these II. IOT HACKING
cameras and printers for extracting information or quietly mine
cryptocurrency at the IoT device owner’s expense. Here we IoT hacking can take numerous forms depending on the
analyze damages on IoT hacking and define botnet architecture. physical device capabilities and hardware. Targeted attacks can
An overview of Mirai botnet and cryptojacking provided to better be categorized as shown in Table 1.
understand the IoT botnets.
TABLE I. TYPES OF IOT HACKING
Keywords— DDoS, Internet-of-things, IoT, Security, Botnet, IoT Hacking Types
Cryptojacking, Mirai Type Effects
I. INTRODUCTION a scenario of this attack can be disabling
medical devices like pacemakers or controlling
Physical Harm
Internet of things or “IoT” has been a popular term that has car intelligent driving controls to steer the end
been mentioned often to categorize physical devices and things user out of control.
that collect and facilitate the exchange of data. These devices using IoT devices to escalate privilege and gain
sensitive data, with cameras one can actively
and networks are widely used on a consumer and industrial level Data Theft
view the feed being recorded or use printers to
from agriculture to home appliances. IoT examples include view documents in queue.
smart light bulbs and outlets that can have user functions sent to this can range from binary controls like turning
the device. On a larger scale a commercial operation of cameras a device on or off to the extent of infecting a
and motion sensors as part of a building's general security. Aside Device Control device to be a part of a botnet that can carry out
from the designed task of these devices, like cameras being used DDOS attacks and use device hardware to mine
cryptocurrency.
to record and write footage, many run some form of Linux and the option to cause damage to a system with the
are connected to servers and home networks. The web of intent of breaking the device often through
connections created by these devices such as cameras and other Shutdown overclock and overheating.
consumer electronics can span into a global network of hundreds
of thousands of devices that if left un-configured can fall victim
to exploits conducted by the hacker. This paper explores some
of the features and functions of Mirai and how the DDoS
environment has made IoT the new normal in hosts that are

978-1-6654-8453-4/22/$31.00 ©2022 IEEE

725
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on January 19,2024 at 14:18:33 UTC from IEEE Xplore. Restrictions apply.
of DDoS attacks” [1] To understand the nature of these attacks
and draw comparison between the different variants created in
botnet malware the process starts by taking advantage of flaws
in IoT device security and actively propagating to weakly
configured devices.
III. MIRAI BOTNET ARCHITECTURE
Mirai and its origins date to August of 2016 where it first
surfaced and followed by a spree of DDoS attack on Krebs,
OVH, Dyn, and Liberian Lonestar. Many variants rooted from
this and made IoT devices the standard for DDoS hosts.
However, there were predecessors to Mirai such as BASHLITE
and Carna, Mirai made a name for itself with these high-profile
attacks and its upgraded features. There are four main
components to Mirai botnet that allow for monitoring and
executing attacks from the botnet. The architecture of the
network can be modified depending on the machines involved
but the Mirai botnet model based on a client-server model. In
Kumar and Bhama’s paper on detecting and confronting IoT
DDoS attacks, they successfully set up a controlled Mirai botnet
using a virtual private server rented by AWS Lightsail [4].

Fig. 1. Mirai botnet architecture A. Mirai Botnet Setup


1) Bot: The bot is the malware itself, Mirai, which will
IoT hacks and exploits vary in severity from organized contain some of the malware’s contents like the dictionary of
botnets that can carry out various attacks to fatal plans to default user-password inputs and brute force abilities. The bots
disable life support systems. To carry any of these attacks one main function is to infect and report to the C&C server to see if
must gain control of the device or create a botnet of the the loader will be required to load Mirai on the new device.
identified IoT devices. Most notably these attacks have taken
2) Command and Control Server(C&C): Provides the
many targets by surprise by the size of the flood from such weak
hacker or botmaster with an interface that will report on the
hosts, IoT devices. In 2016 a spree of massive DDoS attacks
botnets state and where one can set up floods or execute crypto
targeted Krebs on Security, a security news and investigative
journalism, documenting an initial attack of 620 Gbps such currency mining, known as cryptojacking.
traffic recorded as some of the largest attacks documented by 3) Report Server: The report server is used between Mirai
the site [1]. This attack was launched by thousands of weak and the loader to log the already infected devices and report to
hosts unlike previous DDoS attacks carried out by hacked the C&C server of the botnets status and statistics.
computers, the nature of the botnet size was unseen before and 4) Loader: The loader is responsible for loading the Mirai
arguably was the start of fame for the Mirai malware. malware or variant into the IoT device picked up by the scanner.
IoT device have a range of use cases from small home The Report and C&C server work together to initiate the loader
lighting capabilities to larger scaled security and monitoring if the device is newly detected to be made a part of the botnet.
projects, the range of severity is what makes botnet malwares so Some of the two common routs hackers take when starting is
destructive as the core vulnerability is selecting a pair of deciding how to utilize the botnet for flooding or for crypto
“logins” and “passwords” which if not configured from default jacking both can be done with Mirai’s default features.
leave a door open to all hackers. IoT vulnerabilities go outside
of the scope of DDoS and were often used for their company B. Maintaining the Integrity of the Specifications
specific exploits before the rise of Mirai. The discovery and buzz The When all components are configured to begin creating a
around IoT vulnerabilities and exploits began to pick up traction botnet the botmaster can decide on what and w hop to scan but
beginning in 2010 and would see the frequency of IoT Journal by default the malware will begin port scanning of telnet port
articles almost triple by 2013 [2]. Such older vulnerabilities that 23, SSH port 22 and HTTP port 80 [4]. Mirai does have hard-
brought attention to some security flaws in IoT networks with coded IP blacklist including the US Postal Service, the
the CVE-2014-8361 vulnerability in Realtek devices which Department of Defense, the Internet Assigned Numbers
would fail to “sanitize” user inputs and allow arbitrary code to Authority, General Electric, and Hewlett- Packard are excluded,
be executed in New Client Requests via remote connections to avoid government detection. When Mirai identifies a potential
thus, leading the attacker to access root level privileges. This victim IoT device it will start a brute force login attempt using
was the nature of some of the early attacks and exploits used; its included list of 62 pre-configured default credentials or user
however, these plugin exploits became outdated in 2016 with the set dictionary list. In Table 2 includes the topmost common
rise of Botnet malwares capable of sending 1.1 Tbps of traffic username and password credentials that were used to gain access
from ~150k ip cameras taking out French cloud service provider to the first IoT device. Many are not only weak password but
OVH [3]. Mirai is one of the largest known IoT malwares and also are left configured with default passwords [5]. Upon
has been the root of many variants and becoming “a new normal successful login, Mirai will log the credentials in the report

726
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on January 19,2024 at 14:18:33 UTC from IEEE Xplore. Restrictions apply.
server and leave the rest up to the botmaster who can move from • When the device is successfully logged into by Mirai
there to further expand his network or explore some of the it will send the IP and credentials to the report server.
devices data. Fig. 1 shows what an already established botnet From here the report server stores the information of
architecture will look like, the process from after the first what worked, the report server will also check to
infected bot changes and is what makes Mirai so infamous as it initiate the loader if the discovered device is new.
has great self-propagating features to build the botnet larger. • If the IP address is new to the botnet, it will initiate the
loader which will load the malware onto the new
victim device. Once shell access has been created
TABLE II. TYPES OF IOT HACKING
using the reporters stored credentials Mirai will send
Top 10 Used Login Credential IoT Attacks the IP address to the loader and store any other device
Login Login information in the report server this includes hardware
root root
architecture and other information to make the
admin admin malware efficient [1].
test test • When the loader has finished loading the Mirai
access access malware the information is shown in the C&C server
DUP root DUP root as a new bot. The loader continues to scan the listed IP
address to ensure reinfection if it gets rebooted. The
DUP admin DUP admin
leader instructs the device to download and execute a
ubnt ubnt corresponding binary version of the Mirai malware via
oracle oracle GNU Wget or Trivial File Transfer Protocol (TFTP).
postgres postgres Once loaded the device will start by killing processes
pi pi run on Telnet and SSH, this means closing ports 22
and 23. Additionally, Mirai will kill processes that are
associated with competing malwares and Mirai
variants like .anime and Qbot[1].
• The botmaster or attack will begin to see his bot farms
status populate as Mirai spreads, this can then allow
control of the botnet from the C&C server. From here
one can control what to do with the botnet. Various
flood capabilities are included in Mirai such as
UDPPlain, HTTP, UDP, VSE, DNS, SYN, ACK,
STOMP and GRE-IP are executable from the attack
file [5].
• The bots will receive instruction and start attacking the
targeted server. This can also take a different rout that
being, launching discreet crypto mining code to use
the device hardware to mine cryptocurrency [7].
Figure 2 includes Mirai’s default DDoS list that comes
with the malware which the attacker can chose to
execute attacks [9].
2) Mirai DDoS Botnets Popularity: In Antonakis’ [8] study
on understanding the Mirai botnet, the researchers find that
Mirai is a vairant of BASHLITE which was a DDoS malware
that preceded Mirais established standard after its first large
scale attacks. BASHLITE began to drop when Mirai released
due to the 62 username/password pairs that came with the new
malware as opposed to the 14 generic passwords stored in
BASHLITE. Additionally, Mirai included credentials specific
Fig. 2. Mirai’s default DDoS attack list to consumer routers and IoT devices and contained a much
faster and efficient scanner to seek more vulnerable devices to
1) Mirai Botnet Operation Process: Mirai Botnet operation add onto the botnet. Years later after these attacks and Mirai is
process consists of the followings: continued to be researched and referenced to as a root malware
• When the bot detects a new victim, it will to many of the newer variants being developed. Though in
asynchronously infect and continuous scanning for recent studies that reference Antonakis found that less than 25%
more devices to test within the network. of bots included a Mirai signature when examining recent
Internet scanning data provided by Censys and Shodan[8].

727
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on January 19,2024 at 14:18:33 UTC from IEEE Xplore. Restrictions apply.
However, Mirai’s nature is to close ports to prevent discovery A. Anomaly-Based
by competing malwares and in this case preventing discovery As the name suggests this approach is based on recognizing
by search engines and instance of malicious behavior on the network. This is done
by first having a saved store of normal network behavior this has
IV. CRYPTOJACKING led to the development of experimental catchers like
Cryptojacking is the criminal side of cryptocurrency mining AutoBotCatcher which utilizes blockchain to detect
where attackers infect a user device to often mine Monero coin decentralized peer-to-peer (P2P) Botnets[9, 11]. This catcher
(XMR) but cans be configured to mine what the attacker desires. uses the concept to look for communities in botnets and correlate
The start of cryptojacking came when Coin hive launched a web it with a block explorer. In the case of cyrptojacking this can be
service to mine XMR in browser while the user is on the site, implemented by finding the target wallet address and notice
this would be a replacement revenue over adware that is patterns in which devices and botnets are sending mining
becoming harder to profit on with the popularity of adblockers. rewards to said address. This can be further followed with a
The Coin hive script would run in the background and would public black explorer for said crypto such as XMR. Block
end at the end of a browser session. This was able to be exploited explorer can track the block and address to create a match to the
when criminals were able to include the script into a variety of owner of the botnet and wallet.
websites. Cybersecurity firm AdGuard reported at least 220 of
B. Signature-Based
the top 100,000 sites launched miners when users opened the
main page. Detecting Botnet signatures that are stored on the system
database can help trace the attacker. However, many of these
However, this number is miniscule to the magnitude of the malwares close ports to detection, a proposed solution using
entire internet but is enough to have reached an estimated 500 Intrusion Detection System to monitor the network for malicious
million people. AdGuards estimate put the revenue or profit, in activity or breaking policy. Like the previous method the IDS
this case as Coin hives script comes at no cost to the attacker, at detector works by logging network traffic and comparing it with
around $43,000 in three weeks. Crypotjacking has lots of known attacks be it previous on the network or known ones that
potential with different types of miners being created to support other networks have experienced that would be supplied by the
new coin ecosystems that may rely on different hardware such vendor [12].
as relying on storage space and hard drives in the case of Chia
coin. The attacks have taken to hackers liking fast where C. Specification-Based
McAfee reported a 629% increase in coin mining malware in the Shares some similarities with the Anomaly based approach
first quarter of 2018. All this not too long after the release of but instead of focusing on the attack logs it draws focus on the
Coin hive’s script. The sample size grew from 400,000 in Q4 malware’s communications and binary. Each malware weather
2017 to 2.9 million in Q1 2018 [7]. it’s a variant or new malware will have a custom format and each
C&C server will similarly have its own protocols but using this
The profit that can be reached largely depends on two things
sampling one can gain info on the structure and intent of the
that are the size of the botnet or its hash rate and the amount of
malware.
time the miner is undetected. In cases of home computers being
infected to see fast profits as it can be hard to find a target D. Hybrid-Based
machine with a performance-oriented CPU or GPU. Attackers This approach takes anomaly and signature-based
resort to searching for viable IoT devices that have mining
approaches or anomaly and specification to gain better
capabilities. IoT botnets running crypto malware can go
undetected as the attacker can optimize the power being used detection and lower false positive rates. SIEM based solutions
and can chose to mine steadily at a rate of low detection or the are being studied more and are like the Hybrid approach where
opposite the enterprise can look and create logs of known attacks to
detect an expected attack rather than react to an ongoing attack.
V. IOT BOTNET DETECTION AND MITIGATION The results of these events indicate if a security incident has
Botnets continue to grow in popularity and size as more occurred by the SIEM software included parsing, indexing, and
devices are turned on and put into use on the internet. To prevent storing of data in search of abnormalities and misuse [13-14].
and actively work on securing IoT devices users should consider
VI. CONCLUSION
applying the same level of importance they do for network
security as they would for their server or home network. As Botnets increase in popularity as many malwares make it
previously mentioned, the infection does not need to be apparent easy for the attacker to look for targets and automatically secure
or malicious as crypotjacking can be done “harmlessly” and is and continue infecting more to be a part of the growing botnet.
meant to be undetected. To better secure IoT devices and detect As a botmaster one has a growing number of capabilities with
botnets there is a limited number of resources but it all really the bots they infect depending on the size and power that can be
starts with basic configurations of the IoT device to change it created, one can use these botnets to mine cryptocurrency for
from all default settings. Detecting the IoT botnet can be broken great profits if undetected or cause DDoS floods of all kinds.
down into four methods and an experimental approach that is Behind the source code and attackers, the real issue and what
discussed in Duwairi et al. [10] on SIEM based detection and allowed the rise of Mirai and its successors is the absence of best
mitigation IoT botnets. practices surrounding IoT devices. Though the threat and IoT
population grows, Mirai and IoT malwares should be seen as
legitimate threats that need solutions from stakeholders and

728
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on January 19,2024 at 14:18:33 UTC from IEEE Xplore. Restrictions apply.
academics that are concerned by the infinitely growing IoT [9] G. Sagirlar, B. Carminati, and E. Ferrari. "AutoBotCatcher: blockchain-
environment. based P2P botnet detection for the internet of things." 2018 IEEE 4th
International Conference on Collaboration and Internet Computing (CIC).
IEEE, 2018.
REFERENCES
[10] B. Al-Duwairi, W. Al-Kahla, M. A. AlRefai, Y. Abdelqader, A. Rawash,
A., and R. Fahmawi, (2020). SIEM-based detection and mitigation of
[1] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. IoT-botnet DDoS attacks. International Journal of Electrical & Computer
Cochran, Z. Durumeric. "Understanding the mirai botnet." In 26th Engineering (2088-8708), 10(2).
USENIX security symposium (USENIX Security 17), pp. 1093-1110. [11] K. Thakur, M. L. Ali, N. Jiang, and M. Qiu, 2016, April. Impact of cyber-
2017 attacks on critical infrastructure. In 2016 IEEE 2nd International
[2] D. Xu, L. W. He, and S. Li. "Internet of things in industries: A survey." Conference on Big Data Security on Cloud (BigDataSecurity), IEEE
IEEE Transactions on industrial informatics 10.4 (2014): 2233-2243. International Conference on High Performance and Smart Computing
[3] K. Constantinos, G. Kambourakis, A. Stavrou, and J. Voas. "DDoS in the (HPSC), and IEEE International Conference on Intelligent Data and
IoT: Mirai and other botnets." Computer 50, no. 7 (2017): 80-84. Security (IDS) (pp. 183-186). IEEE.
[4] C.U. Om Kumar and S. Bhama, 2019. Detecting and confronting flash [12] S. Schmeelk, K. Thakur, M. L. Ali, D. M. Dragos, A. Al-Hayajneh, and
attacks from IoT botnets. The Journal of Supercomputing, 75(12), B.R. Pramana, 2021, December. Top Reported Data Security Risks in the
pp.8312-8338. Age of COVID-19. In 2021 IEEE 12th Annual Ubiquitous Computing,
Electronics & Mobile Communication Conference (UEMCON) (pp.
[5] A. Shiler and E. Stepanova. "Complex security problems of the internet 0204-0208). IEEE.
of things." MATEC Web of Conferences. Vol. 265. EDP Sciences, 2019.
[13] V. Gorbach, M. L. Ali, and K. Thakur, 2020, September. A Review of
[6] H. Tuttle "Cryptojacking." Risk Management 65.7 (2018): 22-27. Data Privacy Techniques for Wireless Body Area Networks in
[7] E. Bertino and N. Islam. "Botnets and internet of things security." Telemedicine. In 2020 IEEE International IOT, Electronics and
Computer 50.2 (2017): 76-79. Mechatronics Conference (IEMTRONICS) (pp. 1-6). IEEE.
[8] M. Pour, A. Mangino, K. Friday, M. Rathbun, E. Bou-Harb, F. Iqbal, S. [14] L. Li, K. Thakur, and M. L. Ali, 2020, September. Potential Development
Samtani, J. Crichigno, and N. Ghani. "On data-driven curation, learning, on Cyberattack and Prospect Analysis for Cybersecurity. In 2020 IEEE
and analysis for inferring evolving internet-of-Things (IoT) botnets in the International IOT, Electronics and Mechatronics Conference
wild." Computers & Security 91 (2020): 101707. (IEMTRONICS) (pp. 1-6). IEEE.

729
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SURATHKAL. Downloaded on January 19,2024 at 14:18:33 UTC from IEEE Xplore. Restrictions apply.

You might also like