But who infected my DVR, and… why?
on
Reading up on the subject is quite interesting and reveals how security experts go about to hunt malware. Like explorers in the rain forest looking for new species and placing traps, security experts place so-called honeypots, special computer systems intended to attract malicious activity for information-gathering purposes. When, at the end of Octobre 2016, they were hunting the Mirai worm, they accidentally caught something unknown, and baptised it ‘Hajime’ (‘beginning’ in Japanese, ‘Mirai’ being Japanese for ‘future’).
The Hajime worm spreads itself by using infected systems to attack others, there is no central server. It targets insecure systems running Linux using a two-phase attack. After gaining access through Telnet, the worm first uploads and executes a small program to establish a good connection to the attacking host, and then downloads the files needed to add itself to the malicious peer-to-peer (P2P) network and turn into an attacker. The P2P network is based on protocols used in BitTorrent.
To avoid getting infected, the classic security rules apply, and especially the one that says: change the default password!
Image: public domain

Discussion (1 comment)