During the month of October, and there’s been a disturbance in the force… the growing presence of a new Internet of Things (IoT) botnet, dubbed ‘Reaper’.  Initial research published by Checkpoint and Qihoo indicates that the IoT Reaper botnet may have already infected more than 2 Million devices, making it one of the most dangerous botnets in the world.

From a NetWitness Packets detection standpoint, FirstWatch has observed Reaper activity since the middle of October.  These attacks are commonly carried over TCP from ephemeral ports to a common set of destination ports as depicted below.

Screen Shot 2017-10-26 at 10.00.42 AM.png

The following Reaper exploit attempts were observed attacking RSA FirstWatch sinkhole infrastructure on October 20th from a likely compromised (i.e., Reaper infected bot) Iranian based source IP address, 84.241.31[.]227.

D-Link Devices - 'command.php' Unauthenticated Remote Command Execution (Metasploit):

reaper-exploit-27528-dlink.png

reaper-command-php-sessions.png

 

Wireless IP Camera (P2P) WIFICAM GoAhead Backdoor / Remote Command Execution:

reaper-system-ini.png

reaper-system-ini-sessions.png

 

Checking to see if the previous exploit worked (thanks @VK_Intel😞

reaper-upgrade-handle-php.png

reaper-upgrade-handle-php-sessions.png

Unknown Credential Stealing Exploit:

reaper-board-cgi.png

reaper-board-cgi-sessions.png

D-Link Devices - 'hedwig.cgi' Buffer Overflow in Cookie Header (Metasploit):

reaper-hedwig-cgi.png

reaper-hedwig-cgi-sessions.png

Linksys WRT160N v2 - 'apply.cgi' Remote Command Injection (Metasploit):

reaper-apply-cgi.png

reaper-apply-cgi-sessions.png

Netgear DGN Devices Unauthenticated Command Execution:

reaper-setup-cgi.png

reaper-setup-cgi-sessions.png

Linus System Files Information Disclosure:

reaper-shell.png

reaper-shell-sessions.png

Notable meta tagging for this activity within Netwitness Packets can be seen below.

reaper-NW-meta.png

Screen Shot 2017-10-26 at 10.01.09 AM.png

RSA FirstWatch has further quantified IoT Reaper attacks in the wild from several thousand source IP addresses, which have been added to the FirstWatch C2 IP feed available in RSA Live and tagged with the following meta data:

  • threat.category = ‘botnet’
  • threat.desc = ‘reaper’

Thanks to Kent Backman‌ (RSA FirstWatch), Andre DiMino (DeepEnd Research), Chris Doman (ThreatCrowd), and Jaime Blasco (AlienVault) for contributing to this research.

FirstWatch_banner.png

Topic: