Hackers hack hackers. There’s no surprise there. Big fish eat little fish. In the past, money mule recruiters have been known to use their recruitment adverts as a lure to get targets to visit a malicious site; while more recently it is suggested that cyberspies hack cyberspies.
Now NewSky Security has found a doubly dubious script kiddie hacking script that contains an obfuscated backdoor inserted by the developer. “On 22nd October 2017,” blogged NewSky’s principal researcher Ankit Anubhav on Wednesday, “we observed a shady yet popular site that often hosts IoT botnet scripts had a new piece of code to offer. Labeled as “NEW IPCAM EXPLOIT”, this script promised to make the work of script kiddies easy by helping them locate IoT devices that use the potentially vulnerable embedded GoAhead server.”
Many different IP cameras are vulnerable, and they figure heavily in IoT botnets such as Mirai and Reaper.
This script intrigued NewSky — unusually, it was cyphered multiple times and archived with gzip. They deciphered it and found a script that would determine whether an IoT device uses the embedded and vulnerable GoAhead server. But they also found a backdoor that uses a shellscript to connect to a malicious server to download and execute another file — which NewSky determined to be the Kaiten botnet.
The motivation for this backdoor is simple. If a script kiddie uses it to gain a 10,000 strong IoT botnet, then multiple kiddies could rapidly gain an army of bots that could all be controlled by the original script developer. It’s a lazy way to build a large IoT botnet.
“Script kiddies often don’t bother trying to understand the tools they use,” comments F-Secure’s Andy Patel, “or read the code associated with those tools, so this is a pretty easy troll to pull off. Considering that there are ongoing turf-wars around the IoT botnets that are so popular with this crowd, I wouldn’t be surprised to hear about similar incidents in the future — or to find out that these things already happened, and we just didn’t hear about them.”

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.
More from Kevin Townsend
- Threat Actor Abuses SuperMailer for Large-scale Phishing Campaign
- Quantum Decryption Brought Closer by Topological Qubits
- IBM Delivers Roadmap for Transition to Quantum-safe Cryptography
- CISO Conversations: HP and Dell CISOs Discuss the Role of the Multi-National Security Chief
- Court Rules in Favor of Merck in $1.4 Billion Insurance Claim Over NotPetya Cyberattack
- Open Banking: A Perfect Storm for Security and Privacy?
- Apiiro Launches Application Attack Surface Exploration Tool
- Phylum Adds Open Policy Agent to Open Source Analysis Engine
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
