"MIRAI": from the Japanese comics the name of the last "cyber-nightmare"

24/11/16

I read the plot of the Japanese manga "MIRAI NIKKI" ("future diary"), however, except to realize that it is not a properly educational product, I did not understand much (maybe I became too old and dull for these things! ), so I could not even understand the link with the malware that was baptized "Mirai". However, origin of the name apart, of the malware in question now we know a lot, indeed too much. The code with which it was written, in fact, has been circulating on the Internet for almost two months and now its variants, its malefic "sons" are proliferating. But Mirai it's not a malware any, in fact, represents the nightmare of every individual who is dear computer security, or of each of us immersed, more or less consciously, in cyber-space (just have a smartphone to be): it is "a cyber weapon" very powerful , never seen before. Exaggerated? The conclusion is yours.

Let's order. The September 20 site of an American computer security expert was hit by an attack like that Distributed Denial of Service (DDoS), of unprecedented scope. Very briefly, thousands, if not millions of devices connected to the Internet infected by the malware, have sent requests for access to site services simultaneously and on an ongoing basis. Result: although the site was equipped with security measures to deal with this type of attack, the number of devices involved was so high that the traffic generated by them has literally "overwhelmed" the security barriers and "collapsed" the site.

A few days later, the 30 September, the code of the malware used for the attack described above was released on the net by the author / authors under the name of "Mirai". But it was not an extreme gesture of generosity among hackers. In general, the code is jealously kept secret and, if anything, sold at a very high price. Instead, experts believe that it was an attempt to divert investigators who were tightening the circle around the author / the attackers. In fact, now, for the justice of any country it will be really difficult, if not impossible, to demonstrate the paternity of Mirai.

However, once in the "public" domain, the malware it has also been analyzed by security operators who, although they have realized the dangers of malware, must not have had time to study and spread the necessary countermeasures. In fact, a few days later they "fell" under the "blows" of Mirai, in order: the French IT services company OVH, the US Dyn and probably even the entire Internet infrastructure of the state of Liberia (it will have been a general rehearsal for an attack on a much more "paying" goal?). With such attacks, whose origin still remains unknown, the real danger of Mirai has appeared in all its gravity: the malware exploits the security vulnerabilities of the cossidetto devices Internet of Things (IoT), ie cameras, smart TV, routers, digital recorders and dozens of other types of devices with at least one Internet connection. Potentially, therefore, are millions of devices capable of launching attacks without the legitimate owner noticing anything (if not a slight slowdown in performance). In fact, it was learned that malware exploits the security vulnerabilities of some electronic components, produced by Chinese companies, present in dozens of models of different devices of manufacturers all over the world (this is globalization, with all its merits but also with its faults!).

Since then there have been several DDoS attacks of flows never recorded before, which have caused extensive damage mainly of an economic nature (but not only). It is suspected that at the base of these other attacks there are variants of Mirai, which in this moment proliferate in the network. In addition, the objectives of the attacks are becoming more and more ambitious, as the authors are always getting away with, but above all, effective countermeasures do not yet appear on the horizon.

Still convinced that it's all an exaggeration? Personally I am of the opinion that the scenario is at least worrying and "consumer of electronics" I feel teased once more. How many "tarot" products have sold me so far? Why is not any computer security certification required for each product, together with energy certification, quality certification, and safety from electromagnetic emissions? Simple. Because currently there are very few products designed, designed and manufactured to offer a guarantee of security from that point of view (the so-called "security by design"). There is no rule that imposes it (at least among those in force), although there are established standards and recognized internationally. Perhaps it costs too much to respect them and make them respected? How long will I have to suspect that behind the seemingly harmless and ultra-thin screen of my smart TV, is there a dreadful cyber weapon?

I am convinced that the digital revolution is an extraordinary opportunity for development, but I am also aware that it is also for the bad guys. I am not an expert in the field, however I have understood that it is necessary to acquire greater awareness about the phenomenon we are experiencing and the risks connected to it. For this reason, for example, as soon as possible I will recommend to my little girl, who at two years already begins to "fiddle" with the smartphone, which is not enough not to open the door to strangers and not accept candy from people who do not know each other . It is also good that you do not accept requests for friendship on social networks by users whose real identity is unknown and that are not opened links to unsafe sites. Then everyone is free to do what he wants, even to continue to believe that they live in the country of cybernetic toys.

By the way, a warning for the happy owners of iPhone, convinced that their smartphone is safer than others (those who use Android are already quite slaughtered): on the site of CERT (Computer Emergency Response Team) National Ministry of Economic Development, an interesting article was published on a flaw of the IOS operating system, which allows to bypass the screen unlock code (https://www.certnazionale.it/). It is a bit 'cumbersome but for those who want to try waiting for it to be available and installed the operating system update, there is also a tutorial on youtube that teaches how to do it.

Ciro Metuarata

 

Sources:

https://www.symantec.com/connect/blogs/mirai-what-you-need-know-about-bo...

https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html

http://www.corrierecomunicazioni.it/digital/44111_attacco-a-twitter-ecco...

https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-...

http://www.bbc.com/news/technology-37859678