This document provides a comprehensive analysis of the MIRAI botnet, a sophisticated malware that specifically targets vulnerable Internet of Things (IoT) devices. The analysis focuses on the bot's infection process, key features, PRNG implementation, information storage, execution flows and loader's functionalities. The MIRAI botnet demonstrates a high level of automation and adaptability, employing scanning techniques and various attack vectors to compromise IoT devices. The PRNG implementation utilizes the Xorshift128 algorithm, optimized for resource-constrained IoT devices. The storage of crucial information within the bot is examined, highlighting the use of obfuscation techniques. The execution flows involve processes for network scanning, attack coordination and attempts to gain unauthorized access using default credentials. The loader component operates with a multi-threaded architecture, efficiently managing the infection process. Additionally, the document explores the loader's features, such as selecting appropriate executables based on hardware architectures and utilizing different file upload methods. These insights shed light on the complexity and versatility of the MIRAI botnet, emphasizing the need for robust security measures. Manufacturers and users are encouraged to prioritize strong passwords, regular firmware updates and network segmentation to mitigate the risks posed by this malicious botnet.

Understanding the MIRAI botnet: scanning process, infection method and key features

F M Lauria
2023

Abstract

This document provides a comprehensive analysis of the MIRAI botnet, a sophisticated malware that specifically targets vulnerable Internet of Things (IoT) devices. The analysis focuses on the bot's infection process, key features, PRNG implementation, information storage, execution flows and loader's functionalities. The MIRAI botnet demonstrates a high level of automation and adaptability, employing scanning techniques and various attack vectors to compromise IoT devices. The PRNG implementation utilizes the Xorshift128 algorithm, optimized for resource-constrained IoT devices. The storage of crucial information within the bot is examined, highlighting the use of obfuscation techniques. The execution flows involve processes for network scanning, attack coordination and attempts to gain unauthorized access using default credentials. The loader component operates with a multi-threaded architecture, efficiently managing the infection process. Additionally, the document explores the loader's features, such as selecting appropriate executables based on hardware architectures and utilizing different file upload methods. These insights shed light on the complexity and versatility of the MIRAI botnet, emphasizing the need for robust security measures. Manufacturers and users are encouraged to prioritize strong passwords, regular firmware updates and network segmentation to mitigate the risks posed by this malicious botnet.
2023
Istituto di informatica e telematica - IIT
botnet
MIRAI
DoS
DDoS
worm
IoT
cybersecurity
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/457352
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact