IoT botnet Torii found targeting attacks on smart home devices

Forums Security News (Security) IoT botnet Torii found targeting attacks on smart home devices

Viewing 0 reply threads
  • Author
    Posts
    • #25356
      TelegramGroup IoTForIndia
      Moderator
      • Topic 2519
      • Replies 0
      • posts 2519
        @iotforindiatggroup

        #News(Security) [ via IoTForIndiaGroup ]


        Torii botnet targets smart home IoT devices.
        The botnet can communicate securely and stealthily, as well as execute different commands sent by the malware author.

        A new IoT botnet named ‘Torii’ was found targeting smart home devices. Security researchers consider it to be the “most sophisticated botnet” they’ve ever seen. This is primarily due to Torii using six different methods for persistence. The botnet also uses a different script from other typical IoT malware in the wild.

        The malware author(s) appears to have designed Torii to be stealthy and persistent. Torii’s operator(s) also created binaries for multiple architectures, to execute its advanced features. Communication with the command and control (C2) servers is encrypted and other advanced functions of the malware include exfiltration and command execution.
        otted the ‘Torii’ botnet strain in his Telnet honeypot, and published a detailed report on the botnet.

        Malware infection vector
        Torii begins by launching a telnet attack and infects weak credentials of targeted devices, following which the botnet executes an initial shell script. Then, the botnet attempts to discover the architecture of the targeted device and downloads an appropriate payload for the device.

        After determining the architecture, the botnet downloads and executes the appropriate binary (dropper) from the C2 server. These droppers are always binary files, in ELF format, and prepare for the second stage of the attack. Once the ELF and executable files are installed, the dropper makes sure that it remains persistent.

        However, this persistence is achieved using at least six methods


        Read More..

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.