Infected IoT devices in the anonymity service

Table of Contents

Thousands of infected IoT devices in for-profit anonymity service

Interplanetary Storm uses P2P networks, mainly on IoT devices with Android.

Around 9000 devices, mostly with the Android, Linux and Darwin operating systems, were integrated into the so-called “Interplanetary Storm” (the name of a botnet whose main purpose is to create a for-profit proxy service), which is presumably intended to be made available anonymously on the Internet.

The basis is evidence collected by researchers

The finding is based on several pieces of evidence collected by researchers from security provider Bitdefender. The core of the evidence is a series of six specialized nodes which form part of the administrative infrastructure.

They include:

  • Proxy backend that pings other nodes to prove their availability
  • Proxy tester that connects to a bot proxy
  • The manager that issues scan and brute force commands
  • Backend interface responsible for hosting a web API
  • Node that uses cryptographic keys to authenticate other devices and sign authorized messages
  • Development node used for development purposes

“Together, these nodes are responsible for checking node availability, connecting to proxy nodes, hosting the Web API service, signing authorized messages, and even testing the malware in the development phase.”

This is what researchers from the Romanian manufacturer of anti-virus software packages “Bitdefender” wrote in a statement on Thursday published report. “This, along with other development decisions, leads us to believe that the botnet is being used as a proxy network, which may be offered as an anonymization service.”

It's not the first time researchers have found botnets used to provide networks for quasi-anonymous Internet use. Security journalist Brian Krebs berichtete already in 2008 about it.

Various Forscher have this also documented. One fact that the manufacturer Bitdefender found interesting at the time is that the anonymous proxy was advertised on the clearnet and not on the darknet forums.

 
Got a security incident?
Trust our certified IT forensic experts in the event of anomalies.
Inquire now
PSN Icon Analysis

Machines are infected by scanning for SSH or secure shell servers, if found they attempt to guess weak passwords. Malware written in the Go programming language then implements a botnet with an original design. This means that its core functionality has been rewritten from the ground up and is not inferred from previously seen botnets.

The code integrates open source implementations of protocols such as NTPUPnP and SOCKS5. In addition, this uses the lib2p library for peer-to-peer functionality. In addition, a lib2p-based network stack is used to interact with the Interplanetary file system, which is often abbreviated to IPFS, is used.

“Compared to other Golang malware we have analyzed in the past, IPStorm is notable in its complex design due to the interaction of its modules and the way it takes advantage of libp2p constructs,” it said Thursday's report that used the acronym for "Interplanetary Storm." “It is clear that the threat actor behind the botnet has mastery of Golang.”

Icon Laptop Gear
Once executed, the code initializes an IPFS node, which launches a series of simple threads known as “goroutines,” which in turn implement each of the main subroutines. Among other things, it generates a 2048-bit RSA key pair that belongs to the IPFS node and is used to uniquely identify the node.
Icon Network
Once a bootstrap process begins, the node is reachable by other nodes in the IPFS network. The various nodes use all components of lib2p communication. In addition to communicating for the anonymous proxy service, the nodes also interact with each other to exchange malware binaries used for updating. To date, Bitdefender has counted more than 100 code revisions, indicating that IPStorm remains active and receiving programming attention.
PSN icon hacker

Bitdefender estimates that there are around 9.000 unique devices, the vast majority of which are Android devices. Only about 1 percent of devices run Linux. Only one machine is believed to be running Darwin. Based on clues collected from the operating system version and, if available, host and username, the security firm has identified certain models of routers, NAS devices, TV receivers and general-purpose circuit boards and microcontrollers (e.g. Raspberry Pis) that are likely to form the botnet.

Many criminals use anonymous proxies to transmit illegal data such as child pornography, threats and swatting attacks. Thursday's report is a good reminder why it's important to always change default passwords when setting up Internet of Things devices and, if possible, to also disable remote administrative access. The cost of not doing this can be not only lost bandwidth and increased power consumption, but also criminal content that could be traced back to your network.

Got a security incident?
Trust our certified IT forensic experts.
Contact us now