Introduction
Overview
In 2016, the Mirai botnet was responsible for one of the largest DDoS attacks in history, targeting Dyn, a DNS provider. Mirai worked by scanning the internet for vulnerable IoT devices, often protected by default or weak credentials, and using them to launch massive attacks. Its source code was later released publicly, leading to many variants.
Vulnerability Details
Mirai infected various IoT devices such as cameras by exploiting weak or hardcoded default credentials. The malware turned these devices into a botnet capable of generating up to 1.2 Tbps of traffic. It used DNS amplification and other reflective DDoS techniques to overwhelm services. Mirai's infrastructure included bots, scanners, loaders, and command-and-control servers. A single manufacturer's unsecured webcams were responsible for a significant portion of the traffic. Once its source code was released on GitHub, attackers began developing new variants. The Mirai case demonstrates the need for stronger IoT security practices, such as password changes, firmware updates, and network segmentation.
Learning Objectives
- Explain DDoS attacks
- Explain Mirai IoT malware
- List common protection mechanisms for DDoS attacks