1、Mirai源码存在缓冲区溢出,可阻止部分DDoS攻击
标题:Bug in Mirai Source Code Could Stop Some DDoS Attacks Dead in Their Tracks
作者信息:Oct 30, 2016 20:30 GMT By Catalin Cimpanu
//BEGIN
Scott Tenaglia, Research Director at Invincea Labs, says that a bug in the Mirai IoT malware source code can be used to stop certain types of DDoS attacks launched by the botnet.
由Mirai发起的僵尸网络攻击,可能由于其IoT恶意代码的源代码存在缓冲区溢出而终止部分基于HTTP的DDOS攻击,而不是先前基于DNS的攻击(据称后者导致Dyn停止服务,从而影响很多网站对外提供访问服务。)
//END
Mirai botnet reaches 775,000 bots
Tenaglia says that this bug can't be used to remove Mirai from infected hosts, but merely stop their attacks.
The only way to remove Mirai from a host is to reboot the device, but researchers say that if the Telnet port remains open to the Internet and the user continues to use factory default passwords, the device is likely to be compromised between two and five minutes.
Mirai, which appeared at the start of September, is one of today's most dangerous malware families, with around 775,000 bots, according to data from Qihoo 360(http://data.netlab.360.com/mirai-scanner), and responsible for the world's largest DDoS attacks, on sites such as Dyn, KrebsOnSecurity, and French ISP OVH.
研究人员称,该bug不会导致Mirai的自动消失,只会导致其预设的攻击失效。目前清除该IoT恶意代码的方法是重启设备,并关闭Telnet登录端口,同时修改默认的用户登录密码;否则的话,2-5分钟后,即使重启,设备又将继续被感染。九月份出现的Mirai目前是最危险的恶意代码家族,按照Qihoo360的统计数字:目前的规模达到78万左右,该僵尸网络导致DYN、KrebsOnSecurity以及法国的ISP OVH遭受了有史以来最大的DDOS攻击。
点评:IoT设备安全继续领跑.... |