Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Large DDoS Botnet Powered by Routers Infected With “Spike” Malware

Researchers at Incapsula have identified a massive distributed denial-of-service (DDoS) botnet made up of hijacked small office and home (SOHO) routers.

Researchers at Incapsula have identified a massive distributed denial-of-service (DDoS) botnet made up of hijacked small office and home (SOHO) routers.

According to a report published by the Imperva-owned security firm on Tuesday, several dozen of the company’s customers have been targeted over the past months by a DDoS botnet powered by tens of thousands of malware-infected routers engaged in application layer HTTP flood attacks.

Researchers have determined that the compromised devices are infected with a piece of malware known as Spike (Trojan.Linux.Spike.A) and MrBlack, a Linux bot first analyzed by the Russian security firm Dr.Web in May 2014.

Incapsula initially believed that the attackers had leveraged router firmware vulnerabilities in order to hijack the devices. However, experts determined that the malicious actors were able to easily compromise the routers because they had been remotely accessible via HTTP and SSH on their default ports, and their interface had been protected with default credentials (e.g. admin/admin). Malicious code injected into the devices was then used to scan for other routers that could be hijacked with the same technique.

The security firm noted in its report that most of the hijacked routers are ARM-based devices from wireless networking product manufacturer Ubiquiti Networks.

Incapsula analyzed a total of 13,000 malware samples found on the infected routers. On average, experts identified four variants of the Spike malware on each compromised device. They also spotted other DDoS threats, such as Dofloo, Mayday and BillGates.

The attacks against Incapsula’s customers started in late December 2014. Over a 121-day period, the company recorded attack traffic coming from more than 40,000 IP addresses spread across 1,600 global ISPs. Researchers also identified the IPs of 60 command and control (C&C) servers used by the attackers.

Attack traffic was traced back to devices located in a total of 109 countries, but more than 85 percent of the compromised routers are located in Thailand and Brazil.

Advertisement. Scroll to continue reading.

According to Incapsula, the hijacked routers are being leveraged by several threat groups, including Anonymous hacktivists. Furthermore, the botnet is similar to the DDoS-for-hire service offered by the Lizard Squad, the group that became famous late last year after disrupting Sony’s PlayStation Network and Microsoft’s Xbox Live.

Reports on the Lizard Squad’s activities revealed that the group also uses hijacked routers in its attacks. Moreover, the timeline of the attacks observed by Incapsula coincides with Lizard Squad-related events, such as the launch of the DDoS-for-hire service, the disruption of the group’s website by Anonymous hacktivists, and the reemergence of the group on Twitter in April.

On the other hand, the Lizard Squad has been known to use a piece of malware detected as Linux.BackDoor.Fgt.1 to control its botnet, not Spike. This either means that the Lizard Squad has changed the malware it’s using, or that the malicious actors monitored by Incapsula are a group of copycats, experts noted.

Incapsula believes that hundreds of thousands — possibly even millions — of routers have been hijacked by malicious actors due to the poor security practices of ISPs, vendors and Internet users.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Google spinoff SandboxAQ has hired Chris Bates as its first CISO.

HackerOne CEO Marten Mickos announced that he will be retiring from the company after nine years.

Lou Serlenga has joined Bitsight as Chief Revenue Officer (CRO), following leadership roles at Tenable, Nile, and HPE.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.