Mirai Pivots from IoT End Points into Corporate SD-WAN Gear as Worst Fears Come True


It’s been awhile since we’ve written about the Mirai botnet, a malware that turns networked devices running Linux into remotely controlled "bots" to perform large-scale network attacks.

While Mirai started out as an IoT security threat, when it initially targeted online consumer devices as first identified in August 2016 by MalwareMustDie, a whitehat malware research group, it has grown to cause some of the largest and most disruptive distributed denial of service (DDoS) attacks, including the infamous October 2016 Dyn cyberattack.

Many security experts and analysts said at the time that the ability for adversaries to pivot from the initial attack (from hacking devices to hacking into entire networks) and last week, those predictions turned into the present moment as VMware’s corporate SD-WAN gear was found to be vulnerable to the same software.

VMWare immediately came out with a software patch that addresses the issue that was uncovered by Palo Alto Networks Unit 42, which has been tracking the evolution of the Mirai malware since 2016.

“As part of this ongoing research, we’ve recently discovered a new variant of Mirai that has eight new exploits against a wide range of embedded devices,” Unit 42 wrote. “These newly targeted devices range from wireless presentation systems to set-top-boxes, SD-WANs, and even smart home controllers.”

In 2016, Mirai used default passwords to gain access to IoT devices but has advanced into more sophisticated measures using “publicly available exploits to propagate and run on vulnerable devices.”

“This newly discovered variant is a continuation of efforts by Linux malware authors to scout for a wider range and thus, larger number, of IoT devices to form larger botnets thereby affording them greater firepower for DDoS attacks,” Unit 42 summarized. “Based on the results observed by using such variants, the exploits that are more effective i.e. the ones that infect a greater number of devices are retained or reused in future variants whereas the less effective ones are retired or replaced by malware authors with other exploits.”

This raises the question of how secure SD-WANs really are, and while some believe the intruders chose the now-fixed VMWare equipment because they identified the vulnerability, others believe we need to take a fresh look at how private networks can harden themselves against future invasions.

Rick Conklin, CTO at Dispersive Networks, said “We should expect to continue to see a rise in the types of attacks on SD-WANs, including now using Mirai software, which is advancing beyond consumer devices to corporate devices. It’s critical for IT and network operations teams to be on a constant vigil, using the best techniques available to check for anomalies that signal possible attacks.”

Conklin believes this is a solid transitional solution, but that ultimately it will be Software Defined Networking with more sophisticated treatment of sessions and micro-segmentation of the network to ensure that critical devices can only talk to servers or users that they are authorized to talk to will win the battle.  That means authentication before access with unauthorized attempts being rejected silently (to the requestor) and being logged for network administrator notification. 

“A simple rule for IoT: Don’t talk to strangers.”
“We’ve been keeping a constant eye on what’s happening with Mirai as IoT deployments like those we protect on a large, distributed scale are very attractive targets,” Conklin said. “2016 was just practice, with consumer devices, set top boxes, smart thermostats, and more so open and easy to penetrate given the prevalence of default passwords. As trillions of dollars are being invested, according to Gartner and other firms, by adversarial and often state sponsored groups, we can expect new levels of sophistication and must defend against those to avoid future surprises which can have life or death results should Mirai be used to control a microgrid, for example.”

Researchers at Palo Alto Networks' Unit 42 found earlier issues in March, when it reported that Mirai is also being used to take control over TVs and projectors, as well as broadband routers, network-attached storage boxes, IP-enabled cameras and other (until then) primarily consumer IoT devices.

At that time, Unit 42 named WePresent projectors, D-Link video cameras, LG digital signage TVs, and routers from Netgear, D-Link, and Zyxel as the end points, which were exploited based on vulnerabilities in firmware

"In particular, Unit 42 found this new variant targeting WePresent WiPG-1000 Wireless Presentation systems, and in LG Supersign TVs," the researchers said. "Both these devices are intended for use by businesses. This development indicates to us a potential shift to using Mirai to target enterprises."

Enterprises need to be on high alert, according to Conklin, including those who believe their SD-WANs to be secure enough to protect valuable data and systems. “Daily attention is required, and for those of us who are in this industry and have a passion for our mission – to protect people, businesses, the environment and democracies, we are grateful for the efforts of researchers like those in Palo Alto’s Unit 42.”

Arti Loftus is an experienced Information Technology specialist with a demonstrated history of working in the research, writing, and editing industry with many published articles under her belt.

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Special Correspondent

Related Articles

From Semtech and Connected Development, the XCVR Development Board and Reference Design for IoT

By: Alex Passett    6/2/2023

Based on Semtech's LoRa SX126x Series, the XCVR Development Board and Reference Design simplifies design processes and reduces time-to-market for IoT …

Read More

At the KORE of Sustainability: Actioning Environmental Improvements in IoT

By: Alex Passett    6/1/2023

For KORE, smaller packaging means a decrease in plastic carbon emissions. This is just one measure KORE is taking to improve sustainability measures i…

Read More

ESG in IoT: Semtech Furthers Commitments to Global Sustainability

By: Alex Passett    6/1/2023

Semtech recently released its inaugural Corporate Sustainability report, detailing its operational impacts and how they affect sustainably supply chai…

Read More

Laird Connectivity Sensors and Iridium Edge Solar: A Partnership for Asset Ecosystems in IoT

By: Alex Passett    5/30/2023

Iridium Communications and Laird Connectivity are integrating respective technologies to enable longer-term IoT asset tracking, monitoring and managem…

Read More

A New Series of Versatile LoRaWAN Modules from Laird Connectivity

By: Alex Passett    5/30/2023

Laird Connectivity revealed its RM126x series of LoRaWAN (Long Range Wide Area Network) modules for customers looking for uncomplicated ways to improv…

Read More