One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components and not embedded in the payload, loaders cannot be analysed using conventional approaches that rely on honeypots for capturing samples. Different approaches are necessary for studying the loaders evolution and defining a genealogy. To address the insufficient knowledge about loaders' lineage in existing studies, in this paper, we propose a semantic-aware method to measure, categorize, and compare different loader servers, with the goal of highlighting their evolution, independent from the payload evolution. Leveraging behavior-based metrics, we cluster the discovered loaders and define eight families to determine the genealogy and draw a homology map. Our study shows that the source code of Mirai is evolving and spawning new botnets with new capabilities, both on the client side and the server side. In turn, shedding light on the infection loaders can help the cybersecurity community to improve detection and prevention tools.

Devils in the clouds: an evolutionary study of telnet bot loaders

Zhu Y.;
2023

Abstract

One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components and not embedded in the payload, loaders cannot be analysed using conventional approaches that rely on honeypots for capturing samples. Different approaches are necessary for studying the loaders evolution and defining a genealogy. To address the insufficient knowledge about loaders' lineage in existing studies, in this paper, we propose a semantic-aware method to measure, categorize, and compare different loader servers, with the goal of highlighting their evolution, independent from the payload evolution. Leveraging behavior-based metrics, we cluster the discovered loaders and define eight families to determine the genealogy and draw a homology map. Our study shows that the source code of Mirai is evolving and spawning new botnets with new capabilities, both on the client side and the server side. In turn, shedding light on the infection loaders can help the cybersecurity community to improve detection and prevention tools.
2023
978-1-5386-7462-8
IoT botnet
lineage inference
loader
taxonomy
File in questo prodotto:
File Dimensione Formato  
Devils_in_the_Clouds_An_Evolutionary_Study_of_Telnet_Bot_Loaders.pdf

non disponibili

Descrizione: Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Tipologia: Versione Editoriale (PDF)
Licenza: Copyright dell'editore
Dimensione 1.12 MB
Formato Adobe PDF
1.12 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
2211.14790v1.pdf

accesso aperto

Descrizione: Preprint - Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Tipologia: Documento in Pre-print
Licenza: Creative commons
Dimensione 834.34 kB
Formato Adobe PDF
834.34 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/35498
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
social impact