
Cy-BOO!-Security Awareness Month Competition Winning Entries
Selina CoenExplore the chilling tale that won our Cy-BOO! Security Awareness Month Competition, revealing the eerie truths of cybersecurity in a hair-raising narrative.
You might indirectly be a member of a club that is so secret, you probably don’t even know it. Ironically these clubs aren’t very discriminatory inducting new members. They will take anyone they can because, when it comes to membership they are all about quantity, not quality. So how might you indirectly be a member? Because they are actively recruiting devices such as your laptop, internet router, webcam or IoT device. In fact, your IoT wearable could even be a member!
A botnet is simply a collection of any type of internet connected device that has been compromised and taken control of by an intruder. Through a command and control center, a single hacker can control hundreds of thousands of devices across the world. They aren’t controlling these devices separately, but collectively as a single unit that acts in a coordinated fashion. Botnets are used to perform nefarious actions such as Distributed Denial of Service attacks (DDoS). The idea is that a hacker can’t generate enough garbage traffic himself to negatively impact a network target, but a large botnet of devices operating in synchronized fashion can generate a great deal.
This was exemplified in the infamous Dyn attack that targeted one of the largest DNS providers in the United States. This massive DDoS attack was able to disrupt the Internet throughout large portions of the United States that in-turn impacted the operations of companies like Amazon and Netflix. This was accomplished by having Botnet members continually issue DNS queries until the DNS servers were overloaded and successfully brought down. What also makes botnet attacks difficult to stop is that the generated traffic is launched from multiple areas of the world so a victimized domain can’t simply block an IP address or two.
However, DDoS isn’t the only use for Botnets. They are also used for high volume spamming, data collection, spying, crypto mining, and credential stuffing attacks to name a few. Botnets don’t always have to incorporate hardware devices either. One example is a Twitter botnet discovered two years ago that consisted of 350,000 bot accounts. One of the primary purposes of the botnet is to create fake trending topics in attempts to sway public opinion. The bots were also used to send spam and assist in social media attacks.
Most botnets are continually trying to grow, but membership isn’t voluntary. Botnet members (Bots) often troll for new prospects through automated scanning processes seeking out devices with prescribed vulnerabilities. For instance, the most famous botnet to date is called Mirai, which remains one of the most active botnets as well. Essentially, it is a form of malware that can be installed on any computer or device running the Linux open-source operating system. The Mirai botnet consists of devices with two key exposures:
By leaving an IoT device open to the telnet protocol, hackers have a way to access the device. Because the default admin credentials of nearly any internet device are listed on the Internet, an unsecured IoT device is basically an open invitation for a Botnet to enter in and take over. The bot herder then downloads some type of payload depending on the device and once installed, the device is ready to take instructions.
If you are starting to wonder if some of your own devices are operating as bots, consider that bot membership isn’t easy to confirm. A bot herder doesn’t want to risk exposing his soldiers, therefore bot activity tends to remain inconspicuous until the bots are needed. For a Windows device, one can monitor their Task Manager for processes that look suspicious. Infected devices can suffer direct damage through CPU burnout, but for the most part, the ancillary cost is the knowledge that someone else is sinisterly controlling your own devices.
Botnets are looking for easy targets, and sadly, there are millions of them out there, maybe billions. For that reason, it doesn’t take a lot of effort to keep botnet malware away.
A botnet is one club you DON’T want to be a member of. It’s a club that finds you, but with a few basic steps, you can clearly let today’s botnets know that your devices are not interested in joining.
Explore the chilling tale that won our Cy-BOO! Security Awareness Month Competition, revealing the eerie truths of cybersecurity in a hair-raising narrative.
On how many times have you received a phone call or an email from a manager in your group requesting he password of an employee to allow them to log...
Step into the spine-chilling world of cybersecurity horrors this Halloween season. Uncover hair-raising tales of data breaches and cyber threats haunting major companies in 2023.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us