Connect with us

Hi, what are you looking for?



BASHLITE Botnets Ensnare 1 Million IoT Devices

Nearly one million devices have been infected with a piece of malware and abused for distributed denial-of-service (DDoS) attacks, according to an analysis conducted by Level 3 Communications and Flashpoint.

Nearly one million devices have been infected with a piece of malware and abused for distributed denial-of-service (DDoS) attacks, according to an analysis conducted by Level 3 Communications and Flashpoint.

The malware in question is BASHLITE, also known as Lizkebab, Torlus and Gafgyt. The threat was discovered in September 2014 after the existence of the ShellShock vulnerability came to light. At the time, the malware had been exploiting ShellShock to compromise devices that it could abuse for DDoS attacks.

BASHLITE’s source code was leaked in early 2015, allowing malware developers to create more than a dozen variants. The fact that the threat is designed to run on multiple Linux architectures makes it ideal for targeting Internet of Things (IoT) devices.

Level 3 and Flashpoint said the total number of infected devices peaked at over 1 million, spread out across multiple botnets. According to researchers, 95 percent of the infected devices are digital video recorders (DVRs) and cameras, four percent are routers, and the rest are Linux servers.

A large percentage of the infected devices are located in Brazil, Taiwan and Colombia. A majority of them are DVRs generically labelled “H.264 DVR” and ones made by video surveillance company Dahua Technology.

Bashlite infections

DVRs are known to contain numerous serious vulnerabilities, including hardcoded passwords, that make them a tempting target for cybercriminals. In some cases, devices from multiple vendors share vulnerable code, providing attackers an even larger victim base.

“Most of these devices run some flavor of embedded Linux. When combined with the bandwidth required to stream video, they provide a potent class of DDoS bots,” researchers said.

Advertisement. Scroll to continue reading.

Experts have been tracking more than 200 command and control (C&C) servers used by the BASHLITE malware family. The IP addresses of these servers are hard-coded in the malware, which makes the botnets easier to disrupt. However, cybercriminals don’t appear too concerned about this aspect as they can easily create new C&C servers and regain access to their bots.

The botnets communicating with these servers have various sizes, ranging from 74 to nearly 120,000 bots. Experts believe the actual number of infections could be much higher considering that they don’t have complete visibility into the attack infrastructure.

The cybercriminals controlling these botnets have used some of the C&C servers to launch more than 100 attacks per day, although 75 percent of the attacks launched using BASHLITE are shorter than 5 minutes. The largest attacks peaked at hundreds of gigabits per second.

In June, web security firm Sucuri reported that a botnet powered by tens of thousands of CCTV devices located around the world had been used to launch DDoS attacks against websites.

“The use of IoT devices in botnets is not new, but as they become more common, we expect these types of botnets to increase in number and power,” Level 3 said in a blog post. “While compromised hosts and home routers continue to be targeted, bot herders will follow the path of least resistance. Before spending more energy on traditional bot hosts, they’ll take advantage of the abundance of insecure IoT devices.”

Related: Botnet Uses IoT Devices to Power Massive DDoS Attacks

Related: Record Number of 100+ Gbps DDoS Attacks Hit in Q1 2016

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...