According to security researchers, a new IoT botnet has quietly hijacked more than 100,000 routers, readying them for paralysing distributed denial-of-service attacks against websites.
The botnet, which some researchers have dubbed “Satori” (a name given to supernatural mind-reading monsters in Japanese folklore), has increased its activity in recent days – propagating very quickly via a zero-day remote code execution vulnerability in Huawei Home Gateway or Huawei’s Echolife Home Gateway devices, and an already documented vulnerability in Realtek routers.
The exploitation of vulnerabilities allows the botnet to infect routers even when they have been secured with strong passwords.
Through the attack, an army of hundreds of thousands of routers are thought to have been commandeered into the botnet. Some commentators have even suggested that over 280,000 IP addresses have been compromised by the attack in just 12 hours.
Like the Reaper IoT botnet before it, Satori is built on the foundations of the notorious Mirai botnet which knocked major websites offline last year, and whose source code was released onto the internet.
Here’s some sensible advice for internet users:
– Ensure that you are not using default passwords on any of your IoT devices. Change them to strong, unique passwords instead. If you think you’ll have trouble remembering them then use a good password manager to store all of your passwords securely. Changing a router’s password won’t protect you if the attack is exploiting a vulnerability, which leads us to the next piece of advice…
– Update your IoT devices with security patches as soon as they become available.
– Disable Universal Plug and Play (UPnP) on routers unless absolutely necessary.
– Purchase IoT devices from companies with a reputation for providing secure devices.
Being 100% secure online is a tough challenge for any of us, but we can reduce the risks by following sensible practices and adopting a layered defence to protect our systems.
tags
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s.
View all postsNovember 14, 2024
September 06, 2024