SlideShare a Scribd company logo
1 of 22
BOTNETSAND
IT’S THREAT TO
THE IOT
WHAT IS A BOT
• An Internet bot, also known as web robot, WWW robot or simply bot, is a software
application that runs automated tasks (scripts) over the Internet.
• Typically, bots perform tasks that are both
simple and structurally repetitive, at a much
higher rate than would be possible for a
human alone.
• The largest use of bots is in web spidering (web crawler), in which an automated script
fetches, analyzes and files information from web servers at many times the speed of a
human
BOTNET EXPLAINED
• A botnet is a collection of internet-connected devices, which may include PCs, servers,
mobile devices and internet of things devices that are infected and controlled by a
common type of malware. Users are often unaware of a botnet infecting their system.
• The word "botnet" is a combination of the words "robot" and "network“
• A botnet is a logical collection of internet connected devices such
computers, smartphones or IoT devices whose security has been breached and control
ceded to a third party. Each such compromised device, known as a "bot"
• Botnet infections are usually spread through malware, such as a Trojan horse.
• Botnet malware is typically designed to automatically scan systems and devices for
common vulnerabilities that haven't been patched, in hopes of infecting as many
devices as possible. Botnet malware may also scan for ineffective or outdated security
products, such as firewalls or antivirus software.
BOTNET ARCHITECHTURE
The botnet architechture can be classififed into two types
• traditional client/server
• Peer to peer
The traditional client/server approach involves setting up
a command-and-control (C&C) server and sending automated
commands to infected botnet clients through a communications
protocol, such as internet relay chat (IRC).
The bots are often programmed to remain dormant and await
commands from the C&C server before initiating any malicious
activities
Simple to deploy, cheap, short latency for large scale attacks
Easiest to eliminate
COMAND&CONTROL ARCHITECHTURE
PEER-PEER ARCHITECTURE
• In this approach to controlling of the
infected bots involves a peer-to-peer
network.
• Instead of using C&C servers, a peer-
to-peer botnet relies on a
decentralized approach.
• Infected devices may be programmed
to scan for malicious websites, or
even for other devices in the same
botnet. The bots can then share
updated commands or the latest
versions of the botnet malware.
• Difficult to eliminate
THE BOTNET MEETS IOT
• one of the fastest growing and nefarious bots include those
that exploit Internet of Things (IoT) devices as weapons of
attack
• By 2016, the number of connected things was nearly
double the number of connected users and the volume of
Connected devices grows much more quickly than the
Internet
population. Depending on which source is consulted, the
number of IoT units installed could reach
as many as 20 billion by 2020
WHY BOTNETS LIKE INTERNET OF THINGS
• Stripped-down OS: These devices often run on the Linux operating system—but use
an embedded or stripped-down version that is comparatively easy to compromise with
malware.
• - Unfettered access: When “things” are Internet accessible, their access is usually
unfettered by filtering or limitations on bandwidth.
• - Lack of basic security: With their barebones OS and processing power, these devices
simply don’t have enough capacity for standard security capabilities like auditing. The
result? Device owners won’t even notice most compromises.
• - Reused components: Device manufacturers often reuse portions of hardware and
software in various devices. Though intended to save engineering time, this practice
also results in default passwords and vulnerabilities being shared across not just device
classes, but also manufacturers.
Lets look into botnets
that changed the way we see the iot
• Zeus
• Srizbi
• Gameover Zeus
• Methbot
• Mirai
• BRICKERBOT: THE VIGILANTE
ZEUS
• Zeus, ZeuS, or Zbot is package that runs on
versions of Microsoft Windows. While it can be
to carry out many malicious and criminal tasks, it is
often used to steal banking information by man-in-
the-browser keystroke logging and form grabbing
• zeus is the first botnet to infect vulnerable devices
and systems, and variants of this malware have
used to spread CryptoLocker ransomware.
• Zeus, or Zbot, was used to harvest banking
credentials and financial information from users of
infected devices
SRIZBI
• The Srizbi botnet, which was first discovered in 2007,
was, for a time, the largest botnet in the world
• Srizbi, also known as the Ron Paul spam botnet, was
responsible for a massive amount of email spam --
as much as 60 billion messages a day, accounting for
roughly half of all email spam on the internet at the
time
• The botnet used a Trojan to infect users' computers,
which were then used to send out spam. Experts
estimated that the Srizbi botnet included
approximately 450,000 infected systems.
GAME OVER ZEUS
• Approximately a year after the original Zeus botnet
was disrupted, a new version of the Zeus malware
emerged, known as Gameover Zeus
• Instead of relying on a traditional, centralized C&C
operation to control bots, Gameover Zeus used a
peer-to-peer network approach, which initially made
the botnet harder for law enforcement and security
vendors to pinpoint and disrupt. Infected bots used
the domains to communicate
• The Gameover Zeus botnet would generate domain
names to serve as communication points for infected
bots. An infected device would randomly select
domains until it reached an active domain that was
able to issue new commands
• The game over zeus came back with more
ransomware
METHBOT
• An extensive cybercrime operation and ad fraud
botnet known as Methbot was revealed in 2016
• Methbot was generating between $3 million and $5
million in fraudulent ad revenue daily last year by
producing fraudulent clicks for online ads, as well as
fake views of video advertisements
• the Methbot campaign is run on approximately 800-
1,200 dedicated servers in data centers located in
both the U.S. and all over world. The campaign's
operational infrastructure includes 6,000 spoofed
domains, and more than 850,000 dedicated IP
addresses, many of which are falsely registered
• The infected servers can produce fake clicks and
mouse movements, as well as forge social media
account logins to appear as legitimate users to fool
conventional ad fraud detection techniques
MIRAI
• The mirai botnet is one of the first botnet to use
the botnet for using the internet of things for
denial of service
• Mirai malware is designed to scan the internet for
insecure connected devices, while also avoiding IP
addresses belonging to major corporations, like
Hewlett-Packard ,Lenovo, Motorola and
government agencies, such as the U.S. Department
of Defense
• Once it identifies an insecure device, the malware
tries to log in with a series of common default
passwords used by manufacturers.
• If those passwords don't work, then Mirai uses
brute force attacks to guess the password. Once a
device is compromised, it connects to C&C
infrastructure and can divert varying amounts of
• Devices that have been infected are often still able to continue functioning
normally, making it difficult to detect Mirai botnet activity from a specific
device.
• For some internet of things (IoT) devices, such as digital video recorders, the
factory password is hard coded in the device's firmware, and many devices
cannot update their firmware over the internet.
• To make things worse the creator of mirai open-sourced the mirai –botnet
and created a large scale havoc on iot
• The recent ransome ransomware attack “wannacry” that shook the world is
also propgated by using mirai
BRICKER BOT
• BrickerBot finds these devices and renders them
unusable. The first version attacked about a
thousand devices and alternate versions attacked
thousands more. It disabled the devices by
formatting the internal memory.
• The devices all used a Linux package called BusyBox
and had exposed telnet-based interfaces with default
passwords. These devices were easily exploited by
the Mirai botnet, which essentially turned them into
denial-of-service weapons.
• Destroys insecure IoT devices to keep them from
taking part in DDoS botnets
• · Only attacks devices already compromised by other
bots
PREVENTING BOTNET ATTACKS
• In the earlier days the botnet can be stoped by identifying the c&c centre
aka(botmaster).but with increase in peer to peer it has been difficult to terminates the
botnets directly
• Be sure to:
•
• Change every device’s factory default credentials.
• Disable telnet and other open ports that are not
used
•Check and upgrade firmware often.
AND FINALLY THE END
With great power comes
great responsbilty the
internet of things may be a
boon to the world . But it
also take the world into a
new game of cyber ware
fare .the internet of things
kils the privacy of the
people and more over it wil
make humans more lazy
and ignorant in a smarter
Way unlike any other

More Related Content

Recently uploaded

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Botnet and it's threat to the internet of things

  • 2. WHAT IS A BOT • An Internet bot, also known as web robot, WWW robot or simply bot, is a software application that runs automated tasks (scripts) over the Internet. • Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. • The largest use of bots is in web spidering (web crawler), in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human
  • 3. BOTNET EXPLAINED • A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things devices that are infected and controlled by a common type of malware. Users are often unaware of a botnet infecting their system. • The word "botnet" is a combination of the words "robot" and "network“ • A botnet is a logical collection of internet connected devices such computers, smartphones or IoT devices whose security has been breached and control ceded to a third party. Each such compromised device, known as a "bot"
  • 4. • Botnet infections are usually spread through malware, such as a Trojan horse. • Botnet malware is typically designed to automatically scan systems and devices for common vulnerabilities that haven't been patched, in hopes of infecting as many devices as possible. Botnet malware may also scan for ineffective or outdated security products, such as firewalls or antivirus software.
  • 5. BOTNET ARCHITECHTURE The botnet architechture can be classififed into two types • traditional client/server • Peer to peer
  • 6. The traditional client/server approach involves setting up a command-and-control (C&C) server and sending automated commands to infected botnet clients through a communications protocol, such as internet relay chat (IRC). The bots are often programmed to remain dormant and await commands from the C&C server before initiating any malicious activities Simple to deploy, cheap, short latency for large scale attacks Easiest to eliminate COMAND&CONTROL ARCHITECHTURE
  • 7. PEER-PEER ARCHITECTURE • In this approach to controlling of the infected bots involves a peer-to-peer network. • Instead of using C&C servers, a peer- to-peer botnet relies on a decentralized approach. • Infected devices may be programmed to scan for malicious websites, or even for other devices in the same botnet. The bots can then share updated commands or the latest versions of the botnet malware. • Difficult to eliminate
  • 8. THE BOTNET MEETS IOT • one of the fastest growing and nefarious bots include those that exploit Internet of Things (IoT) devices as weapons of attack • By 2016, the number of connected things was nearly double the number of connected users and the volume of Connected devices grows much more quickly than the Internet population. Depending on which source is consulted, the number of IoT units installed could reach as many as 20 billion by 2020
  • 9. WHY BOTNETS LIKE INTERNET OF THINGS • Stripped-down OS: These devices often run on the Linux operating system—but use an embedded or stripped-down version that is comparatively easy to compromise with malware. • - Unfettered access: When “things” are Internet accessible, their access is usually unfettered by filtering or limitations on bandwidth. • - Lack of basic security: With their barebones OS and processing power, these devices simply don’t have enough capacity for standard security capabilities like auditing. The result? Device owners won’t even notice most compromises. • - Reused components: Device manufacturers often reuse portions of hardware and software in various devices. Though intended to save engineering time, this practice also results in default passwords and vulnerabilities being shared across not just device classes, but also manufacturers.
  • 10. Lets look into botnets that changed the way we see the iot • Zeus • Srizbi • Gameover Zeus • Methbot • Mirai • BRICKERBOT: THE VIGILANTE
  • 11. ZEUS • Zeus, ZeuS, or Zbot is package that runs on versions of Microsoft Windows. While it can be to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in- the-browser keystroke logging and form grabbing • zeus is the first botnet to infect vulnerable devices and systems, and variants of this malware have used to spread CryptoLocker ransomware. • Zeus, or Zbot, was used to harvest banking credentials and financial information from users of infected devices
  • 12. SRIZBI • The Srizbi botnet, which was first discovered in 2007, was, for a time, the largest botnet in the world • Srizbi, also known as the Ron Paul spam botnet, was responsible for a massive amount of email spam -- as much as 60 billion messages a day, accounting for roughly half of all email spam on the internet at the time • The botnet used a Trojan to infect users' computers, which were then used to send out spam. Experts estimated that the Srizbi botnet included approximately 450,000 infected systems.
  • 13. GAME OVER ZEUS • Approximately a year after the original Zeus botnet was disrupted, a new version of the Zeus malware emerged, known as Gameover Zeus • Instead of relying on a traditional, centralized C&C operation to control bots, Gameover Zeus used a peer-to-peer network approach, which initially made the botnet harder for law enforcement and security vendors to pinpoint and disrupt. Infected bots used the domains to communicate • The Gameover Zeus botnet would generate domain names to serve as communication points for infected bots. An infected device would randomly select domains until it reached an active domain that was able to issue new commands • The game over zeus came back with more ransomware
  • 14. METHBOT • An extensive cybercrime operation and ad fraud botnet known as Methbot was revealed in 2016 • Methbot was generating between $3 million and $5 million in fraudulent ad revenue daily last year by producing fraudulent clicks for online ads, as well as fake views of video advertisements • the Methbot campaign is run on approximately 800- 1,200 dedicated servers in data centers located in both the U.S. and all over world. The campaign's operational infrastructure includes 6,000 spoofed domains, and more than 850,000 dedicated IP addresses, many of which are falsely registered • The infected servers can produce fake clicks and mouse movements, as well as forge social media account logins to appear as legitimate users to fool conventional ad fraud detection techniques
  • 15. MIRAI • The mirai botnet is one of the first botnet to use the botnet for using the internet of things for denial of service • Mirai malware is designed to scan the internet for insecure connected devices, while also avoiding IP addresses belonging to major corporations, like Hewlett-Packard ,Lenovo, Motorola and government agencies, such as the U.S. Department of Defense • Once it identifies an insecure device, the malware tries to log in with a series of common default passwords used by manufacturers. • If those passwords don't work, then Mirai uses brute force attacks to guess the password. Once a device is compromised, it connects to C&C infrastructure and can divert varying amounts of
  • 16.
  • 17. • Devices that have been infected are often still able to continue functioning normally, making it difficult to detect Mirai botnet activity from a specific device. • For some internet of things (IoT) devices, such as digital video recorders, the factory password is hard coded in the device's firmware, and many devices cannot update their firmware over the internet. • To make things worse the creator of mirai open-sourced the mirai –botnet and created a large scale havoc on iot • The recent ransome ransomware attack “wannacry” that shook the world is also propgated by using mirai
  • 18. BRICKER BOT • BrickerBot finds these devices and renders them unusable. The first version attacked about a thousand devices and alternate versions attacked thousands more. It disabled the devices by formatting the internal memory. • The devices all used a Linux package called BusyBox and had exposed telnet-based interfaces with default passwords. These devices were easily exploited by the Mirai botnet, which essentially turned them into denial-of-service weapons. • Destroys insecure IoT devices to keep them from taking part in DDoS botnets • · Only attacks devices already compromised by other bots
  • 19. PREVENTING BOTNET ATTACKS • In the earlier days the botnet can be stoped by identifying the c&c centre aka(botmaster).but with increase in peer to peer it has been difficult to terminates the botnets directly • Be sure to: • • Change every device’s factory default credentials.
  • 20. • Disable telnet and other open ports that are not used
  • 21. •Check and upgrade firmware often.
  • 22. AND FINALLY THE END With great power comes great responsbilty the internet of things may be a boon to the world . But it also take the world into a new game of cyber ware fare .the internet of things kils the privacy of the people and more over it wil make humans more lazy and ignorant in a smarter Way unlike any other