International cybersecurity firms expect a botnet swarm to hit “an estimated million organizations” across the Internet.
(TNS) -- WASHINGTON — Just as hurricane trackers chart storms in the Atlantic before they make landfall, cybersecurity researchers track viral infections that threaten mayhem. They’ve found a doozy.
A massive zombie robotic network, or botnet, has expanded to infect “an estimated million organizations” and could bring corners of the internet to its knees, an Israeli cybersecurity company, Check Point Software, says.
“The next cyber hurricane is about to come,” Check Point says.
Several cybersecurity researchers Monday confirmed Check Point’s findings, saying the botnet could replicate, and perhaps dwarf, the Mirai botnet that almost exactly a year ago took down major websites on the Atlantic Coast, crippling a part of the internet’s backbone and slowing traffic to a crawl.
The botnet, which has been named either “Reaper” or “IoTroop,” was first detected in mid-September. A Chinese cybersecurity firm, Qihoo 360, says the botnet is swelling by 10,000 devices a day, forcibly recruiting foot soldiers in an ever-larger invisible rogue army.
Cybercrime gangs form botnets by infecting internet-enabled devices, often wireless cameras or routers with weak security features. Once corralled, controllers can send commands for the botnet to overwhelm a target, knocking its website off line or crippling the internet.
The new botnet has spread across the United States, Australia and other parts of the globe, researchers say, although Check Point notes that “it is too early to assess the intentions” of those propagating the infection.
“It could be something that’s meant to create global chaos,” Maya Horowitz, threat intelligence group manager at Check Point, said in a telephone interview from Israel. “But it could be something that’s more targeted,” perhaps aimed at a country or industry.
She said it is unlikely that cybersecurity experts will be able to halt an eventual attack.
“The chances are pretty low for that,” Horowitz said, adding that like an epidemic of infectious disease, “each infected device is looking for other devices to compromise.”
Criminal hackers are assembling increasingly powerful botnets.
“They are getting bigger and badder,” said Robert Hamilton, director of marketing at Imperva Incapsula, a Redwood Shores, California, cybersecurity firm that offers technology to mitigate botnet attacks.
“The motive more than ever is money,” he said, adding that criminal gangs send ransom demands to companies threatening to hit them with a distributed denial-of-service, or DDoS, attack unless paid off.
“We had a client that received a letter that said ‘if you don’t pay us, we are going to bring your websites down with a DDoS attack,’” Hamilton said. “This was a client that you’d definitely recognize their name,” declining to specify the company.
Last year’s Mirai botnet attack hit Dyn, a New Hampshire company that provides backbone services for the internet. Imperva says it found 49,657 infected devices spread over 164 countries. The top infected countries were Vietnam, Brazil and the United States.
Scores of major companies were hit in that Oct. 21, 2016, attack, including Netflix, Twitter, Spotify, HBO, Amazon, CNN, ancestry.com and Comcast.
The new botnet is based on the source code for Mirai, Horowitz said, “but about 100 different functions have been added … and it has the potential to reach many, many more devices.”
The malware creating the botnet is infecting a variety of Internet of Things (IoT) devices but has been found with functions to target networking gear or routers manufactured by D-Link, TP-Link, AVTECH, NETGEAR, MikroTik, Linksys and Synology, Check Point said.
“Since Reaper is exploiting a number of known vulnerabilities in different IoT devices, this botnet could definitely be much more disruptive than Mirai,” said Merike Kaeo, chief technology officer at Farsight Security, a San Mateo, Calif., cybersecurity firm. “Known security issues in cameras, televisions, home routers, and any other internet-connected devices need to be addressed and fixed.”
Consumers can do their bit by checking to ensure that “all of their internet-connected devices, especially home routers, have the latest firmware upgrades and security patches installed,” Kaeo said.
©2017 McClatchy Washington Bureau Distributed by Tribune Content Agency, LLC.
Looking for the latest gov tech news as it happens? Subscribe to GT newsletters.