Impact on IOT with Hajime Malware

Impact on IOT with Hajime Malware 1

 

Impact on IOT with Hajime Malware 2Like many internet worms, the Hajime malware has a lifecycle. A Hajime infection begins when  a node already in the Hajime network–scanning random IPv4 addresses on the public internet–discovers a device which accepts connections on TCP port 23, the designated port for the Telnet service. The attacking Hajime node attempts several username and password combinations from its hardcoded list of credentials and, upon being granted entry, examines the target system and begins its infection in stages. The first stage is a small, short-lived file-transfer program which connects back to the attacking node and copies down a much larger download program. The download program–the second stage–joins a peer-to-peer decentralized network and retrieves its configuration and a scanning program. The scanning program searches the public internet for more vulnerable systems to infect, thus continuing the lifecycle.

[emaillocker id=5644][/emaillocker]

Report

Written by Srikanth

Passionate Tech Blogger on Emerging Technologies, which brings revolutionary changes to the People life.., Interested to explore latest Gadgets, Saas Programs

Leave a Reply

Your email address will not be published. Required fields are marked *

Virtual private clouds offer an alternative to on-premises computing1

Virtual private clouds offer an alternative to on-premises computing

4 types of social media analytics2

4 types of social media analytics