symantec logo

Worm IoT Used for currency mining

End of 2013, h Symantec discovered an Internet worm of ( Worm IoT ) with the name Linux.Darlloz. The virus targets computers running Intel x86 architectures. Beyond that, the virus also focuses on ARM, MIPS, and PowerPC ARMs, typically found in routers and set-top devices. After the initial discovery of Linux.Darlloz, the company discovered a new variant of the virus early this year. According to the analysis, the creator Worm IoT constantly upgrades the code and adds new features, focusing in particular on making money through the virus.

Worm IoT
Symantec Worm IoT

Investigating the entire Internet IP field in February, Symantec discovered that there were more than 31.000 devices infected by Linux.Darlloz (Worm IoT).

Coin mining

Additionally, the company discovered that the current target of the virus is cryptocurrency mining. Just one s running on Intel architecture is infected by a new variant, the virus installs a cpuminer, an open source software that acts as a source of coin mining. The virus then starts mining Minocoins or Dogecoing from the infected computers. At the end of February 2014, the attacker mined 42.438 Dogecoins (about US$46) and 282 Mincoins (about 42.438 Dogecoins). These amounts are relatively low for average cybercrime activity, so we expect the attacker to continue to evolve their threat to increase revenue.

The new currency coin mining feature only affects computers running Intel x86 architectures and Symantec has not yet identified its impact on IOT devices. These devices require more memory and a powerful CPU for mining coins.

Why Mincoin and Dogecoin?

Worm IoT seems to be targeting Mincoins and Dogecoins, instead of focusing on the famous and more widespread means of Bitcoin transactions. The reason for this is that Mincoins and Dogecoins use the scrypt algorithm, which can be successfully mined from home PCs while Bitcoins require ASIC chips to make a profit.

New goals

The original version of Darlloz has nine combinations of user names and codes for routers and set-top devices. The most recent version now has 13 from these input authentication combinations, which also work for IP cameras, commonly used for remote building surveillance. 

Why devices IoT;

The Internet of Things ( Worm IoT ) is associated with connected devices of all kinds. While many users can assure that their computers are safe against attacks, they may not have realized that their IoT devices also need protection. Unlike ordinary computers, many IoT devices send information with a default username and password and many users may not have changed them. As a result, the use of preselected user names and passwords is one of the leading agents for attacks against IOT devices. Many of these devices also contain vulnerabilities associated with incomplete updates that the user does not know.

While this particular threat focuses on computers, routers and IP cameras, the virus could be upgraded to target other IoT devices in the future, such as home automation devices and technology devices that can be worn.

By preventing other intruders

The virus prevents other intruders or viruses, like viruses Linux.Aidra, from targeting devices already infringed by Linux.Darlloz. The malware developer attached this feature to the virus when it was released last November.

At the beginning of the year there were reports about one back in a series of routers. Using the backport, attackers could gain access to routers remotely, allowing them to compromise the user's network. For the creator of Darlloz, this was a threat, so they added a feature that will block access to the backdoor slot by creating a new firewall rule on the infected devices to ensure that no other attacker can access the same rear door.

Contamination of systems

Worm IoT
Worm IoT

Some statistics on virus infection:

  • 31.716 IP addresses that were infected with Darlloz were detected.
  • Darlloz infestations affected 139 sites.
  • 449 fingerprint OSs from infected IP addresses were detected.
  • 43% of Darlloz infections violated computers that contained Intel or servers using Linux.
  • 38% of Darlloz infections appear to have affected a variety of IOT devices including routers, set-boxes, IP cameras and printers.

The five regions that accounted for 50% of all Darlloz infections were China, the US, South Korea, Taiwan and India. The reason for the high rate of infections in these countries is more likely due to the large amounts of Internet users or the penetration of IoT devices.

Infected devices IoT

Consumers may not realize that their IoT devices can be infected by . As a result, this virus managed to infect 31.000 computers and IoT devices in four months and is still spreading. We expect that the creator will continue to upgrade this virus with new features as the technology landscape is constantly changing. Symantec will continue to monitor this threat closely.

Meters

  • Εφαρμόστε security για όλο το λογισμικό που εγκαθιστάτε σε υπολογιστές ή συσκευές IoT
  • Upgrade your firmware to all devices
  • Change the default codes on all devices
  • Obstruct the 23 or 80 port from outside if not required

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.091 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).