Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Hajime Botnet Malware Observed Infecting 300,000 Unsecure IoT Devices

    Written by

    Robert Lemos
    Published April 28, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Over the past six months, a botnet known as Hajime has successfully infected more than 300,000 Internet-of-Things devices, in a sign that manufacturers continue to fail to secure their  network-connected devices, according to an analysis published by security firm Kaspersky Lab on April 25.

      The botnet mainly uses two methods of attack that focus on the brute-force guessing of passwords or exploiting the use of a default password, Igor Soumenkov, principal security researcher at Kaspersky Lab, told eWEEK. For example, one module focuses on the Arris cable modem and uses a password-of-the-day algorithm to login to devices that have the capability activated. The vulnerability has been known since 2009, according to Kaspersky Lab.

      “What is surprising is that the simplest methods—such as brute forcing the password—still work and they are effective at infecting,” Soumenkov said. “A lot of devices use preset passwords that no one changes, and a lot of times the user cannot even modify the password.“

      Hajime, which means “beginning” in Japanese, is a global botnet. While the botnet has focused on finding devices with weak passwords, the programmer, or programmers, behind the malware continue to improve on its design as well. Most recently, the developers added the ability to exploit a protocol used by Internet service providers to remotely manage devices, Kaspersky Lab stated in its analysis.

      The botnet has successfully compromised devices around the globe. About half of the infected devices appear to be operating in five different countries: Iran, Brazil, Vietnam, the Russian Federation and Turkey. The lion’s share of the devices appear to be digital video recorders and Internet-connected video systems, Soumenkov said.

      “Most of these are cameras and DVRs, or video-security cameras and the servers used to help with recording to the video cameras,” he said. The makers of such systems have historically given short shrift to security, he added. “Most of these devices are produced by a limited number of vendors and they are easy to exploit.”

      All the devices targeted by the botnet run some form of Linux or embedded Linux, Soumenkov said. The malware will attempt to detect the specific type of device before trying its telnet exploit, but otherwise does not discriminate, according to Kaspersky Lab’s analysis.

      “The malware authors are mainly reliant on very low levels of security,” the researchers stated.

      The botnet is unrelated to the infamous Mirai botnet, which has been used to create denial-of-service attacks to overwhelm victims’ networks with traffic. Last September, a massive attack effectively blocked access to a popular security blogger’s site and an internet service provider.

      So far, the purpose of the botnet remains unclear, according to Kaspersky Lab. Unlike Mirai, Hajime botnet is not known to have been used in an attack.

      “While the botnet is getting bigger and bigger, partly due to new exploitation modules, its purpose remains unknown,” the analysis stated. “We haven’t seen it being used in any type of attack or malicious activity.”

      However, the author of the malware behind the botnet has apparently left a message behind on every infected device: “Just a white hat, securing some systems. Important messages will be signed like this! Hajime Author.”

      So far, there seems to be no evidence that the person or group behind Hajime is securing the systems infected by the malware, Kaspersky said. “Whether the author’s message is true or not remains to be seen,” the analysis concluded.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×