AKAMAI THREAT ADVISORY. Satori Mirai Variant Alert

Similar documents
AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI WHITE PAPER. Security and Mutual SSL Identity Authentication for IoT. Author: Sonia Burney Solutions Architect, Akamai Technologies

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

CONTENT-AWARE DNS. IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. AKAMAI DNSi CACHESERVE

SOTI SUMMER [state of the internet] / security ATTACK SPOTLIGHT

and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

akamai s [state of the internet] / security

Evidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

MULTIPLAYER GAMING SOLUTION BRIEF

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry

Mitigating DDoS Attacks in Zero Seconds with Proactive Mitigation Controls

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Intelligent and Secure Network

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

See What You ve Been Missing

TechValidate Survey Report: SaaS Application Trends and Challenges

Trends in IoT DDoSbotnets

NINE MYTHS ABOUT. DDo S PROTECTION

Arbor WISR XII The Stakes Have Changed. Julio Arruda V1.0

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Prolexic Attack Report Q4 2011

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Securing Your Amazon Web Services Virtual Networks

Cisco Firepower with Radware DDoS Mitigation

Q&A TALKING CYBER SECURITY WITH THE BOARD OF DIRECTORS. An interview with Josh Shaul, VP, Web Security Products

Protecting organisations from the ever evolving Cyber Threat

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Analisi degli attacchi DDOS e delle contromisure

VIDEO ON DEMAND SOLUTION BRIEF

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Securing Your Microsoft Azure Virtual Networks

TREND MICRO SMART PROTECTION SUITES

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DDoS MITIGATION BEST PRACTICES

is dominated by these trends that characterize the state of all things Business depends on flawless digital experiences. This is true for the

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration

Imperva Incapsula Product Overview

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Office 365 Buyers Guide: Best Practices for Securing Office 365

Detect & Respond to IoT Botnets AS AN ISP. Christoph Giese Telekom Security; Cyber DefenSe Center

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Cisco Advanced Malware Protection against WannaCry

Enterprise D/DoS Mitigation Solution offering

The 2017 State of Endpoint Security Risk

CDN TUNING FOR OTT - WHY DOESN T IT ALREADY DO THAT? CDN Tuning for OTT - Why Doesn t It Already Do That?

Cybersecurity with Automated Certificate and Password Management for Surveillance

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

RSA INCIDENT RESPONSE SERVICES

The Interactive Guide to Protecting Your Election Website

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE

WHITE PAPER HIGH-FIDELITY THREAT INTELLIGENCE: UNDERSTANDING FALSE POSITIVES IN A MULTI-LAYER SECURITY STRATEGY

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Cisco ASA 5500 Series IPS Edition for the Enterprise

Preparing your network for the next wave of innovation

Managed Endpoint Defense

Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

Microsoft Security Management

RSA INCIDENT RESPONSE SERVICES

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

Introduction. The Safe-T Solution

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Validating the Security of the Borderless Infrastructure

How DDoS Mitigation is about Corporate Social Responsibility

Use Cases. E-Commerce. Enterprise

Transcription:

AKAMAI THREAT ADVISORY Satori Mirai Variant Alert Version: V002 Date: December 6, 2017

1.0 / Summary / Akamai, along with industry peers, has identified an updated variant of Mirai (Satori) that has activated within the past 24 hours and is rapidly growing. In the past 24 hours, Akamai has observed more than 650,000 unique IP addresses, confirming with peers in the industry seeing comparable numbers. This activity expands beyond the bruteforce type of attack seen with Mirai exploit activity previously, adding exploits that target multiple vulnerabilities: 1. One new undisclosed vulnerability in Huawei Home Gateway and CPE devices 2. Existing CVE-2014-8361 3. Previous list of vulnerabilities on IoT and CPE devices Much of the scanning activity is sourced from Mirai nodes, in the most recent Wproot/ Mroot and login variant, from the end of November. The admin/centryl1nk login variant seems to be concentrated in devices located in Egypt, Ecuador, Tunisia, Argentina, and Colombia. Akamai is working with industry peers to investigate, mitigate, and remediate the activities around this malware system. When appropriate, Akamai will add new rules to our security solutions. Akamai recommends that our customers take the actions described in the Recommendations section as soon as possible, to mitigate risk of a DDoS attack from this botnet. Consultations with Akamai SEs and NAMs would help determine if Akamai s solutions and tools would be able to assist. 2.0 / Recommendations / The main threat vectors for Satori are the infections of devices inside networks and then the use of the infected devices for malicious activities. Efforts to track down infected devices, mitigating their impact, and then remediation are prudent for all networks to explore. Review of the security tools deployed to protect services from attacks launched by Satori is recommended. DoS attacks would be one of the expected uses, but not the only use. Kona Customers. Akamai recommends customers verify that their Kona WAF rules are set to deny and the following provisions are in place: Place the origin behind Site Shield to block direct-to-origin attacks. Implement rate controls sitewide. Akamai recommends settings of 40 requests/second for bursting and 20 requests/second for average to mitigate http floods. 2

3.0 / Findings Summary / On December 5, 2017, 0200Z, Akamai s infrastructure logged a dramatic increase in scanning activity destined for ports TCP 37215 and TCP 52869 (visualization included below). Prior to this time, scanning activity to those ports was minimal with a large increase in scanning observations after 0200Z (Figures 1, 2). Figure 1: Scanning Activity (packets), TCP 37215 Figure 2: Scanning Activity (packets), TCP 52869 3

Akamai has corroborated these observations with industry peers working together to investigate this surge of activity. A TLP:WHITE example was issued by 360 Netlab (Ref: http://blog.netlab.360.com/warning-satori-a-new-mirai-variant-is-spreading-in-wormstyle-on-port-37215-and-52869-en/): To highlight the above statement, Satori is based on Mirai, but does not rely on brute-forcing login combinations in order to infect its targets. Satori utilizes an unpublished exploit to target specific devices similar to the Reaper botnet. Associated Binaries df9c48e8bc7e7371b4744a2ef8b83ddf a7922bce9bb0cf58f305d17ccbc78d98 37b7c9831334de97c762dff7a1ba7b3f e1411cc1726afe6fb8d09099c5fb2fa6 cd4de0ae80a6f11bca8bec7b590e5832 7de55e697cd7e136dbb82b0713a01710 797458f9cee3d50e8f651eabc6ba6031 353d36ad621e350f6fce7a48e598662b 8db073743319c8fca5d4596a7a8f9931 0a8efeb4cb15c5b599e0d4fb9faba37d 08d48000a47af6f173eba6bb16265670 e9038f7f9c957a4e1c6fc8489994add4 b okiru.mipsel okiru.arm7 okiru.x86 okiru.x86 okiru.mips okiru.m68k okiru.arm okiru.sparc okiru.powerpc okiru.x86_64 okiru.superh Malware delivery IPs 95.211.123.69 77.73.69.177 172.93.97.219 165.227.220.202 198.7.59.177 4

Current C2 95.211.123.69:7645 This C2 was first null routed by the community taking action against Satori, then removed by the organization for which it was hosted (2017-12-06). We expect new C2s to be used as this incident evolves. Distraction C2 109.206.187.130:23 (Believed to be distraction for threat researchers) 4.0/ Malware Analysis (x86) / VirusTotal: https://www.virustotal.com/#/url-analysis/u-ae9fd49dc90f8e360597c0b0950 7255e33ce9cb0209b75adaa230b3243961dfa-1512498951 Detux: https://detux.org/report.php?sha256=f9a4c6857bb3a4feebb232c54e6ecff d3742ce598b48e975d675b38232b8e30e Hybrid Analysis: https://www.hybrid-analysis.com/sample/f9a4c6857bb3a4feebb232 c54e6ecffd3742ce598b48e975d675b38232b8e30e?environmentid=300 Do you have questions, comments, or feedback about this report? Please contact sirt@akamai.com As the world s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai s massively distributed platform is unparalleled in scale with more than 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai s portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media and entertainment providers, and government organizations trust Akamai, please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations. Published 12/17.