About BotenaGo, How can Keysight Help?

2022-02-15 Keysight

Researchers discover highly productive IOT device Botnet, known as Botenago, source code on Github. This effectively puts the power of Botenago into the hands of any unscrupulous attacker.


Over the years, there are certain historic events that become part of Security Folk Law.  I'm sure you'll all recall WannaCry, NotPetya, Colonial Pipeline, and SolarWinds amongst many.  And who could forget Mirai? 


OK, it was 2016, so maybe a quick recap.


MIRAI

Mirai was malware that exploited vulnerabilities in millions of IOT devices, infecting them and turning them into bots, to be unwittingly used as part of extremely large botnets. Ultimately, the resulting botnets were famously used in massive DDoS attacks. In one case, the Mirai Botnet took down a key DNS service provider, Dyn, causing outages across many popular internet sites and services.


Mirai wasn't really an exploit or a hack.  It was more a case of accessing publicly exposed IOT devices with inherently weak security controls, including fixed usernames and known passwords.  Given the inherent insecurities traditionally built into many IOT devices, and the insane number of them out there, Mirai gave botnets a scale that had never been seen before.


One of the twists to this story is that the authors were co-founders of a DDoS mitigation solution, and so you could think of MIRAI as a key part of their business growth strategy.  Another twist was that they released the code to public forums, and later to Github, in an attempt to cover their tracks.  They figured they'd be safe, since they wouldn't be the only ones to have the code on their machines.  However, this widespread availability was key to the botnet's overall impact, as the code was adapted to build multiple variants that targeted various architectures.


HERE WE GO AGAIN

History has a habit of repeating itself, so step forward six years, and here we go again.  In November 2021, AT&T Alien Labs™ first published research on their discovery and named the malware "BotenaGo", with subtle nod to it being written in Golang (Go). 

 
Here's what we know about BotenaGo so far:

•    It's likely to affect millions of routers & IOT devices
•    The code is now posted on Github
•    The malware is very difficult to detect.
•    One of the command and control (C2) indicators of compromise (IOCs) is from the Apache Log4Shell IOCs.


It's likely to affect Millions of Routers & IOT Devices

Best practice tells us not to expose IOT devices to the internet.  Yet, given the vast range of IOT functionality, in many cases they've been designed with the expectation that they'd eventually be exposed.  We also know many IOT devices have been designed with no focus on security, and in some cases utilize fixed credentials, so there really should be additional security measures deployed to protect them.  Add to that the fact that BotenaGo exploits routers, and much of BotenaGo's concern is justified.  You only have to run some simple searches on Shodan to find many thousands of devices that could be targeted, and that's just one search term.  



The code is now on Github

Having the code publicly available is significant. Firstly, it means that threat actors can modify the code to target additional vectors, architectures, and more. Given the language it is written in (go) is suited to ease of compilation to different architectures, it's highly likely derivatives will occur.  Having access to IOT devices isn't necessarily the endgame though: we should expect this to be a pivot point for targeting other assets on the network, expansion of other exploits and architectures, and payloads.  Either way, history tells us there will likely be an uptick in DDoS activity.


It's difficult to detect

Initially, according to VirusTotal, only 3 out of 60 security vendors detected BotenaGo. Today that's increased to 25 and no sandboxes.


The use of Google's Open-Source Golang language (GO) is also significant, as it allows for ease of compilation for different architectures, so we should expect to see many variants as a result.


Mitigation Advice

The recommended mitigation actions haven't changed significantly from the MIRAI outbreak:

•    Reduce your attack surface by minimizing IOT devices' internet exposure.
•    Ensure your devices are behind correctly configured firewalls.
•    Install the latest firmware and software updates.


Sage advice, for sure.  However, the fact that we are seeing history repeating itself really highlights we are not addressing the problem as well as we could.  


We rely on security controls, yet only 3 out of 60 of security vendors (and no sandboxes) have detected this malware.  


And what about the payloads that will come from having the code on Github: will they be detected?


And how do we ensure firewalls are correctly configured?


So many questions!


How Can KEYSIGHT Help

When MIRAI first appeared back in 2016, breach and attack simulation hadn't been defined.  Now you can up your game. Deploying Keysight Threat Simulator enables you to continuously measure, manage, and improve your cybersecurity effectiveness. In short, Threat Simulator helps you address these issues and many more.  


Recently, our Application Threat Intelligence Team (ATI) have developed a feature on Threat Simulator called Priority Risk Mitigation. This feature gives our customers access to the latest malware of concern seen in the wild in the last 24 hours, which you'll not be surprised to hear contains BotenaGo samples.


How to know if you are vulnerable to the latest BotenaGo-based attacks

You are worried about yet another cyber threat. You hope you are protected, but you'll have to wait 4 months for your next pen test engagement to be sure. That's a long time for your network and devices to potentially be vulnerable.


Why wait?  You can safely emulate a BotenaGo attack on your network right now. Just deploy a Threat Simulator agent on your network, emulate a vulnerable IOT device, and safely orchestrate an actual attack. Moreover, Threat Simulator will tell you if you were able to block the attack or not, as well as notifying you if your SIEM was alerted.  Furthermore, if remediation is required, it will show you exactly how to fix the vulnerability for your specific security controls.



How to know if you're safe from lateral movement in the event of a successful attack

Lateral movement is a big concern.  Having an IOT device compromised is one thing, but cybercriminals can cause more damage by pivoting their attack to more high-value assets, even in other network segments.  


Threat Simulator enables you to be able to run full kill-chain scenarios and lateral movement with just a few mouse clicks.  Deploying Threat Simulator agents in all your network segments means you can continuously run those scenarios as often as you want. And because we only target our agents, there is no risk to your high-value assets.



How to ensure you'll be able to detect new variants of BotenaGo

With so many malware variants appearing (especially in this case), coupled with a very low detection rate, you'll want to be sure you can detect any variants of BotenaGo. But how do you get the latest malware, run it through your network, and do all of that without accidentally detonating it?


Threat Simulator has a feature we call Priority Risk Mitigation. This means we automatically notify you with the most prevalent malware we've seen in the previous 24 hours. You can then schedule assessments to test your defenses against these attacks on a daily basis. And in case you don't detect something, we'll flag that up to you so you can take immediate action. Of course, it's totally safe for your network and security tools.  Although it is real malware (it would have to be to allow detection) we only target our agents, and we don't detonate it, so you are safe.



Don't go it alone

Keysight has played a leading role in security for 20 years, and Threat Simulator isn't the only way we can help you.


Concerned about IOT security?  Take a look at our IOT Security Assessment Solution.

Want to test your DDoS mitigation solution? Take a look at our BreakingPoint Cloud Solution.

Want to reduce your attack Surface? Take a look at ThreatARMOR.


技术资料,数据手册,3D模型库,原理图,PCB封装文件,选型指南来源平台:世强硬创平台www.sekorm.com
现货商城,价格查询,交期查询,订货,现货采购,在线购买,样品申请渠道:世强硬创平台电子商城www.sekorm.com/supply/
概念,方案,设计,选型,BOM优化,FAE技术支持,样品,加工定制,测试,量产供应服务提供:世强硬创平台www.sekorm.com
集成电路,电子元件,电子材料,电气自动化,电机,仪器全品类供应:世强硬创平台www.sekorm.com
  • +1 赞 0
  • 收藏
  • 评论 0

本文由董慧转载自Keysight,原文标题为:Here we BotenaGo Again!,本站所有转载文章系出于传递更多信息之目的,且明确注明来源,不希望被转载的媒体或个人可与我们联系,我们将立即进行删除处理。

相关研发服务和供应服务

评论

   |   

提交评论

全部评论(0

暂无评论

相关推荐

Keysight Launches Cybersecurity Partnership Program for Managed Security Service Providers, Offering an Award-winning BAS Solution

Keysight provides the proactive capabilities for MSSPs to rapidly find, remediate, and validate their customers‘ exploitable security vulnerabilities — before they become headline news.

2023-05-07 -  原厂动态

面对物联网僵尸网络的攻击,Keysight Threat Simulator可以让您持续测量、管理和提高网络安全效率

遇到来自BotenaGo的攻击时,只需在网络上部署Keysight Threat Simulator代理,模拟易受攻击的物联网设备,并安全地策划实际攻击。此外,Threat Simulator将告诉您是否能够阻止攻击,并在SIEM收到警报时通知您。此外,如果需要修复,它将准确地向您展示如何修复特定安全控制的漏洞。

2022-04-21 -  原厂动态

Microsoft Exchange Server EWS Insecure Deserialization, Leverage Subscription Service to Stay Ahead of Attacks

Keysight Threat Simulator or BreakingPoint products can help you assess your network security controls and determine whether you can be protected prior to patch.

2022-03-15 -  原厂动态

What Can You Do to Strengthen Your Network?

This blog suggested a simple 3-point plan that can strengthen your network, Keysight offers many solutions that could be beneficial.

2022-03-08 -  设计经验

威胁模拟器系统Z2098B-171-020:20GHz射频多源机架,配备2个N5193A灵活信号源和8个N5194A矢量信号源

型号- N5194A,Z2098-60408,KS83100A,Z2098B-171-020,N5222B-417,E1135-80050,Z2098-60403,N4691D,N5194A-520,Z2098-60371,Z2098-60393,Z2098-60394,85523B,Z2098B-172-020,KS8400A,N5193A,Z2098B-222,Z2098B-104,Z2098-60437,J9150D,DSOS054A,Z2098-60436,Z2098-60435,U2002A,N5193A-520,85556A,JL253A,85530B

February 3, 2020  - KEYSIGHT  - 数据手册
August 4, 2023  - KEYSIGHT  - 商品及供应商介绍

Z2098B V-UXG威胁模拟器源系统数据表

型号- N5194A,Z2098B,Z2098-60408,E1135-80050,Z2098B-171-4VG,Z2098-60403,N5194A-540,N5194A-520,Z2098-60002,Z2098-60371,Z2098-60393,Z2098-60010,Z2098-60394,N5193A,Z2098B-222,Z2098B-171-2V4,Z2098-60437,Z2098B-171-4V4,Z2098B-229,J9150D,Z2098-60436,Z2098-60435,Z2098B-171-2VC,Z2098B-171-4VC,Z2098B-171-2VG,Z2098B-171-2V8,N5193A-540,Z2098B-171-4V8,N5193A-520,JL253A,Z2098B-242

June15, 2020  - KEYSIGHT  - 数据手册

网络性能和安全产品目录

描述- 本资料主要介绍了Keysight公司提供的网络性能和安全产品,包括威胁模拟器(Threat Simulator)、威胁ARMOR、Hawkeye和SSL VPN网关评估服务。这些产品旨在帮助用户识别和修复安全漏洞,提高网络安全性,并确保网络性能。资料详细介绍了每个产品的功能、部署方式、许可证类型以及如何通过这些工具来增强网络安全和性能监控。

September 15, 2020  - KEYSIGHT  - 选型指南

Threat Simulator ——入侵与攻击模拟

型号- 983-2012,983-2111,983-2133,983-2013,983-2112,983-1012,983-2014,983-2113,983-2114,983-2015,983-2115,983-22014,983-2019,983-2020,983-2010,983-2131,983-2011,983-2110,983-101

2022年8月24日  - KEYSIGHT  - 数据手册

Keysight’s on-premises solutions as well as cloud-based solutions in RSA 2022

At the Keysight booth, we were showing off our on-premises solutions as well as our cloud-based solutions. These solutions included: Flex taps and iBypass switches, inline and out-of-band Vision ONE network packet brokers, Threat Simulator, and CyPerf.

2022-06-20 -  应用方案

威胁模拟器-违规和攻击模拟平台

型号- 983-2012,983-2013,983-2014,983-2010,983-2011

September 22, 2020  - KEYSIGHT  - 数据手册 查看更多版本

威胁模拟器系统

型号- Z2098-60408,KS83100A,U2022XA,E1135-80050,Z2098-60403,Z2098B-172-408,Z2098B-171-408,Z2098-60371,Z2098-60394,M9807A-200,85523B,KS8400A,N5193A,Z2098B-244,Z2098B-104,J9150D,Z2098-60434,DSOS054A,M9019A,N4692D,N5193A-540,85556A,JL253A,85540A,Z2098B-242

July 11, 2019  - KEYSIGHT  - 数据手册

A-UXG威胁模拟器源系统

型号- Z2098B-172-208,Z2098-60408,Z2098B-172-404,Z2098B-172-204,E1135-80050,Z2098-60004,Z2098-60403,Z2098-60006,Z2098B-172-408,Z2098-60002,Z2098B-171-408,Z2098-60371,Z2098B-171-X04,Z2098-60010,Z2098-60394,Z2098B-171-X08,Z2098B-171-204,Z2098B-171-404,Z2098B-171-208,N5193A,Z2098B-222,Z2098B-244,Z2098B-224,Z2098-60437,Z2098B-229,J9150D,N5193A-540,N5193A-520,JL253A,Z2098B-242

June 6, 2020  - KEYSIGHT  - 数据手册

Z2098B UXG威胁模拟器校准系统

型号- Z2098B,Z2098B-172-208,Z2098B-172-404,Z2098B-172-204,Z2098B-171-4VG,Z2098B-172-X0X,Z2098B-172-408,Z2098B-171-408,Z2098B-172-4VG,Z2098B-172-2VG,Z2098B-171-204,Z2098B-171-404,Z2098B-171-208,Z2098B-172-XVX,Z2098B-171-2V4,Z2098B-172-4V8,Z2098B-171-4V4,Z2098B-172-2V8,Z2098B-172-4VC,Z2098B-172-2VC,Z2098B-171-2VC,Z2098B-171-4VC,Z2098B-171-2VG,Z2098B-171-2V8,Z2098B-172-4V4,Z2098B-171-4V8,Z2098B-172-2V4

June 15, 2020  - KEYSIGHT  - 数据手册
February 7, 2019  - KEYSIGHT  - 数据手册
展开更多

现货市场

查看更多

品牌:KEYSIGHT

品类:Digital Volt Meter

价格:¥300.0000

现货:105

品牌:KEYSIGHT

品类:Software License

价格:¥5,885.8626

现货:92

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥6,255.4404

现货:42

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥10,738.2780

现货:39

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥2,279.0608

现货:34

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥5,964.0270

现货:33

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥5,507.7707

现货:28

品牌:KEYSIGHT

品类:示波器升级软件

价格:¥300.0000

现货:26

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥27,841.4996

现货:24

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥5,642.3160

现货:16

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

电子商城

查看更多

暂无此商品

千家代理品牌,百万SKU现货供应/大批量采购订购/报价

服务

查看更多

网络分析仪/频谱仪/信号分析仪/无线综测仪/信号发生器租赁

提供是德(Keysight),罗德(R&S)测试测量仪器租赁服务,包括网络分析仪、无线通讯综测仪、信号发生器、频谱分析仪、信号分析仪、电源等仪器租赁服务;租赁费用按月计算,租赁价格按仪器配置而定。

提交需求>

网络分析仪/频谱仪/信号分析仪/无线综测仪/信号发生器维修

朗能泛亚提供是德(Keysight),罗德(R&S)等品牌的测试测量仪器维修服务,包括网络分析仪、无线通讯综测仪、信号发生器、频谱分析仪、信号分析仪、电源等仪器维修,支持一台仪器即可维修。

提交需求>

查看更多

授权代理品牌:接插件及结构件

查看更多

授权代理品牌:部件、组件及配件

查看更多

授权代理品牌:电源及模块

查看更多

授权代理品牌:电子材料

查看更多

授权代理品牌:仪器仪表及测试配组件

查看更多

授权代理品牌:电工工具及材料

查看更多

授权代理品牌:机械电子元件

查看更多

授权代理品牌:加工与定制

世强和原厂的技术专家将在一个工作日内解答,帮助您快速完成研发及采购。
我要提问

954668/400-830-1766(工作日 9:00-18:00)

service@sekorm.com

研发客服
商务客服
服务热线

联系我们

954668/400-830-1766(工作日 9:00-18:00)

service@sekorm.com

投诉与建议

E-mail:claim@sekorm.com

商务合作

E-mail:contact@sekorm.com

收藏
收藏当前页面