Digital security is defined as the collective term that is responsible for describing the resources that have been employed for protection of the online, identity and various assets.
These tools comprise web services, smartphone SIM cards, secured personal devices, cards and biometrics.
Malware is defined as the umbrella term responsible for describing the code or malicious program that creates harm to the systems.
It is the file or any program that gas intent to harm the server, network or computer (Auliar and Bekaroo, 2021).
The presentation is based on the malware named Mirai malware that is responsible for infecting the smart devices that are executed on the ARC processes that are liable for turning these into the remotely controlled zombies or bots.
The presentation will provide insight into the malware and impact it creates.
Slide 2:Mirai Malware
Mirai was carried out by Dalton Norman, Josiah White and Paras Jha as the part of Minecraft scam.
The initial goal for execution of the extortion scheme was to take down the Minecraft servers and initiate the protection racket.
It scours through the internet for all the unsecured smart devices that is liable for seizing the control for the network of bots that have create and possess the capabilities for launching the devastating cyberattacks.
Mirai botnets are utilized by intruders or cybercriminals for targeting the computers systems within the massive DDoS attack.
Slide 3:Technical Details
Mirai botnets are utilized via cybercriminals for targeting the computer system within the massive distributed DDoS.
The Linux OS is targeted by the intruders as it is utilized by various IoT (Inter of Things) devices for execution (Liu et al., 2019).
The IP addressed are scanned for identification of the smart devices executed on the distinct versions.
Mirai malware is designed for exploitation of the vulnerabilities that are present within the gadgets and are associated to the network infected devices that is botnet for gaining access through the password combinations and username.
When it becomes part of botnet then then the hijacked hardware will be co-opted for committing the further attacks which becomes herd of the zombie machines.
The Realtek-based routers are used as weapon by the intruder.
Slide 4:Spread of Malware
The Mirai botnets are dangerous as these are utilized within the DDoS attacks that are commercially devastating and it becomes difficult to stop these.
Instead of attacking the systems, the malware attacked available IoT devices. The vulnerable devices such as smart cameras, routers, etc. were infected (Yamaguchi and Gupta, 2021).
The internet is scanned by the Mirai for targeting and breaching the security of devices via usage of default information such as username and combination of passwords.
It hardly took any time for the Mirai to infect huge number of IoT devices worldwide and acquired relevant power.
In 2016, the attack that was made against OVH peaked over 1THps.
Slide 5:Cont…
The Mirai attack persists because of the certain factors,
Low consumer interest: The infected device will be working reasonably and will any pose any risk to the individuals who are using it. Individuals are not compelled for changing any details that they are working with.
Weak manufacturer compliance: There are different cost concerns due to which the manufacturing firms make investment in the security. The price point will be less when the device is stripped down (Clincy and Shahriar, 2019).
Irrelevant overarching government insight: Some states have imposed laws for IoT security. For example, in California, the IoT devices are shipped with unique credentials. There is lack of global or federal laws for widespread of the compliance.
Slide 6:Effects On The System
Mirai will scan the internet for identifying the IoT devices that are running on the ARC processor.
If the default information is not changed then Mirai can log in within the system and effect it.
IoT comprises smart devices that are connected with the internet which can be vehicles, agricultural devices, environmental monitoring devices, smoke detectors, home appliance, etc.
When intruders get access to these devices then impact created will be wide, for example, home appliances, if these will be mishandled then it might cost the life of individuals (Ngo et al., 2020).
The initial iteration of the Mirai botnet that was created by the DDoS mitigation firm. The targets were infected by them and the owner of system was asked to make payments for protecting from the attack.
The players logged into the hosted server and they spend within the virtual world, where they were involved in making real-world purchase for enhancing their game time.
When hosting server goes offline then it implies having loss of thousands of dollars and victims paid the amount so that they can stay online
The attack surface was widened after this.
Slide 7:Impact of Malware
Once, the IoT devices are infected with the Mirai malware then the tiny attacks will be launched against the chosen victim. When thousands of IoT devices are infected then the impact that will be created cannot be ignored.
Access: The device will reach the central server for attainment of the instructions and these asks for the specific server over the time.
Reinfect: By turning off device the malware and attack cannot be prevented as if port is open then the problem will take place through the usage of the new source code (Vengatesan et al., 2020).
Dominate: All other malware that were executed on the devices will be removed and only Mirai malware will be executed.
Hide: Slight sluggishness might be experienced or noticed by the owner other than this there will be nothing.
Slide 8:Impact on individual and society
The consumer devices such as home routers, and smart cameras so that they can be turned to the zombie network for the remote-controlled bots.
Mostly the Mirai malware is utilized for impacting the networked smart home devices such as thermostats, refrigerators, baby monitors, and routers.
The IoT botnets hold up the devices as hostage with certain spread spam emails, ransomware and perpetrate the click-fraud for harvesting the sensitive financial information personal data (Palla and Tayeb, 2021).
Considering impact on the society, in October 2016 it implicated where the website for Dun was turned botnet that is liable to offer DNS (domain name system).
Due to the overwhelming traffic because of the IoT devices, the website went down, due to which most of East Coast was down and there was lack of connectivity due to which companies were shut down.
It influenced the economic perspective of the country was impacted.
Slide 9:Conclusion and Recommendations
From above it can conclude that malware is the intrusive software that is developed or designed with intent to destroy and damage the computer systems.
Mirai malware is the kind of the malware that is liable for targeting the consumer devices such as home routers, and smart cameras so that these can be transformed into the network of zombie that will be controlled via bots.
Recommendation
The Mirai malware is present within the device memory. The device can be restarted where it can be unplugged and kept in this manner for some time. It is enough for stopping the attack that is under progress and devices can be cleaned. Here, it is important that if credentials of the device are not changed then the possibility of attack is high.
Slide 10:References
Auliar, R.B. and Bekaroo, G., 2021, October. Security in IoT-based Smart Homes: A Taxonomy Study of Detection Methods of Mirai Malware and Countermeasures. In 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (pp. 1-6). IEEE.
Clincy, V. and Shahriar, H., 2019, July. IoT malware analysis. In 2019 IEEE 43rd annual computer software and applications conference (COMPSAC) (Vol. 1, pp. 920-921). IEEE.
Liu, Z., Zhang, L., Ni, Q., Chen, J., Wang, R., Li, Y. and He, Y., 2019. An integrated architecture for IoT malware analysis and detection. In IoT as a Service: 4th EAI International Conference, IoTaaS 2018, Xi’an, China, November 17–18, 2018, Proceedings 4 (pp. 127-137). Springer International Publishing.
Ngo, Q.D., Nguyen, H.T., Le, V.H. and Nguyen, D.H., 2020. A survey of IoT malware and detection methods based on static features. ICT Express, 6(4), pp.280-286.
Palla, T.G. and Tayeb, S., 2021. Intelligent Mirai malware detection for IoT nodes. Electronics, 10(11), p.1241.
Vengatesan, K., Kumar, A., Parthibhan, M., Singhal, A. and Rajesh, R., 2020. Analysis of Mirai botnet malware issues and its prediction methods in internet of things. In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018) (pp. 120-126). Springer International Publishing.
Yamaguchi, S. and Gupta, B., 2021. Malware threat in Internet of Things and its mitigation analysis. In Research Anthology on Combating Denial-of-Service Attacks (pp. 371-387). IGI Global.