- Dec 27, 2016
- 1,480
'Hajime', an IoT malware strain discovered last October, appears to be the work of a vigilante who has set out to take over and neutralize as many smart devices as possible before other botnets like Mirai can.
While Hajime was first observed last year, it only recently became apparent to researchers that the author of this malware had no intention of using infected devices for evil.
What is it up to then?
For the past six months, Hajime has been using its self-replication module to fight with Mirai DDoS and other IoT botnet for control over IoT devices.
Once Hajime infects a device it blocks access to the famous ports 23, 7547, 5555, and 5358.
After that, Hajime also contacts its command and control server and returns a cryptographically-signed message every ten minutes.
The message, which is displayed on the device's terminal, reads as follows:
Unfortunately, Hajime's actions aren't permanent, because just as Mirai, the worm and its actions are removed from infected hosts when the owner reboots his device. This is why Hajime and Mirai are entangled in an infinite loop for control over these devices.
One day Mirai may be using your DVR to launch DDoS attacks against a gaming company, while the next day Hajime will be closing the DVR's ports. As the device is rebooted, the cycle repeats in an endless loop, depending on what malware strain first reaches the device.
Furthermore, Hajime also got a helping hand from another malware strain called BrickerBot, which also appears to be the work of another Internet vigilante.
According to Grange, this tactic appears to have been a success as Hajime spread quickly across the globe, already taking over and neutralizing a large number of devices in countries such as Brazil, Iran, and Russia.
While Hajime was first observed last year, it only recently became apparent to researchers that the author of this malware had no intention of using infected devices for evil.
What is it up to then?
For the past six months, Hajime has been using its self-replication module to fight with Mirai DDoS and other IoT botnet for control over IoT devices.
Once Hajime infects a device it blocks access to the famous ports 23, 7547, 5555, and 5358.
After that, Hajime also contacts its command and control server and returns a cryptographically-signed message every ten minutes.
The message, which is displayed on the device's terminal, reads as follows:
Just a white hat, securing some systems.
Important messages will be signed like this!
Hajime Author.
Contact CLOSED
Stay sharp!
Unfortunately, Hajime's actions aren't permanent, because just as Mirai, the worm and its actions are removed from infected hosts when the owner reboots his device. This is why Hajime and Mirai are entangled in an infinite loop for control over these devices.
One day Mirai may be using your DVR to launch DDoS attacks against a gaming company, while the next day Hajime will be closing the DVR's ports. As the device is rebooted, the cycle repeats in an endless loop, depending on what malware strain first reaches the device.
Furthermore, Hajime also got a helping hand from another malware strain called BrickerBot, which also appears to be the work of another Internet vigilante.
According to Grange, this tactic appears to have been a success as Hajime spread quickly across the globe, already taking over and neutralizing a large number of devices in countries such as Brazil, Iran, and Russia.