SlideShare une entreprise Scribd logo
1  sur  27
State of the Internet: Mirai, IOT & History of Botnets
Ashvini Singhal, Head - Security Operations Center, Akamai
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Internet- Threat Lanscape
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
DDoS Attack Trends
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
What Comes to Mind When your
Hear the Word?
BotNet
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
DDoS
Malware
Service Disruption
Something “Bad”
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
A group of internet-connected devices controlled by a central system
What does a BotNet Really Mean?
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Lee Enfield No.4 Mk2
Firepower - Then
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Firepower - NOW
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
What made it so EASY?
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
IOT – Internet of Things
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Large Attacks – Q3 2016
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Large Attacks – Q4 2016
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Botnet Attacks
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Mirai- Botnet
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Mirai (Japanese for “The Future”)
What is Mirai?
This tool achieved particular notoriety for its specific targeting of IoT
devices, such as IP cameras, WiFi-connected refrigerators, unsecured home routers, etc
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
3 Typical Attack Targets:
• Datacenter routing
• DNS
• Application
Problem is, if any of the 3 are taken out, the entire enterprise is taken out
Unlike many Attack Bots, Mirai can be very specifically aimed at all 3 targets
with great accuracy
Mirai Baseline
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Mirai – Attack Vector
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and sophistication of web
attacks.
Command and Control
Report server
Infection server
Manually Infected IoT Device
Component's of the Mirai Bot Net
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Life Form
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and sophistication of web
attacks.
1.1.1.1 admin admin✓
1.1.1.1 admin admin ✓
The IoT Bot scans the internet for other devices and test default username and password combosSuccessful results are sent to the Report server.Report server sends results to the Infection server to infect new bot.Bots come online and connect to the C2 for instructs and maintain heartbeatBots come online and connect to the C2 for instructs and maintain heartbeat and restarts processes.
C2
Report
Infection
BasicAnatomy IoT infection
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Mirai – Scanning
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Mirai Attack – DNS Variant
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Mirai Attack – Broad Spectrum Attack
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
What Can You Do?
Phase 1 • Strict access controls on your firewall(Datacenter, Web and
DNS)
Phase 2 • Loosen your Phase I controls to bring secondary services
back online
Phase 3 • Bring all services back online
KNOW YOUR ENVIRONMENT
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
A Pervasive Platform:
• Every major city
• Every major network
• One network hop
away from 95% users
Accelerating:
• 5 of the top 5 high tech firms
• 3 of the top 3 stock exchanges
• 5 of the top 5 M&E firms
• 5 of the top 5 ecommerce firms
Akamai has 400+
customers in India,
including the who’s who
of the Indian
Enterprise!
Akamai in India
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
216,000+ servers
1,500+ networks
650+ cities
120+ countries
A GLOBAL PLATFORM
All top 60 eCommerce sites
All top 30 M&E companies
All branches of the U.S. military
All top 10 banks
DELIVERING 13+ MILLION
HOSTNAMES
40+ million hits per second
2+ trillion deliveries per day
30+ terabits per second
ACCELERATING DAILY TRAFFIC OF
Akamai Today
Delivering 15-30+%
of All Web Traffic
©2015 AKAMAI | FASTER FORWARDTM
Akamai Confidential
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Thank You!

Contenu connexe

Tendances

Tendances (20)

The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & AccessHow Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 

En vedette

Avoiding dns amplification attacks
Avoiding dns amplification attacksAvoiding dns amplification attacks
Avoiding dns amplification attacks
Lucas Kauffman
 

En vedette (20)

Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamicciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
 
Introduction to Containers and Docker for PHP developers
Introduction to Containers and Docker for PHP developersIntroduction to Containers and Docker for PHP developers
Introduction to Containers and Docker for PHP developers
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 
Introduction of Mirai Translate, Inc.
Introduction of Mirai Translate, Inc. Introduction of Mirai Translate, Inc.
Introduction of Mirai Translate, Inc.
 
Avoiding dns amplification attacks
Avoiding dns amplification attacksAvoiding dns amplification attacks
Avoiding dns amplification attacks
 
Dns reflection attacks webinar slides
Dns reflection attacks webinar slidesDns reflection attacks webinar slides
Dns reflection attacks webinar slides
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
 

Similaire à State of the Internet: Mirai, IOT and History of Botnets

DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
IDATE DigiWorld
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
magda3695
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
magda3695
 
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PROIDEA
 

Similaire à State of the Internet: Mirai, IOT and History of Botnets (20)

Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
 
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated
 
Threat intelligence at the cloud
Threat intelligence at the cloudThreat intelligence at the cloud
Threat intelligence at the cloud
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to Practice
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
 
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiGreat Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, Akamai
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
 
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
 
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 

Plus de Rahul Neel Mani

Plus de Rahul Neel Mani (19)

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo HospitalsSMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
 
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas TripathiPreparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
 
Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)
 
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh BatraIT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh Batra
 
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...
 
Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?
 
Becoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to ThriveBecoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to Thrive
 
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
 
Preventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical ElementsPreventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical Elements
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

State of the Internet: Mirai, IOT and History of Botnets

  • 1. State of the Internet: Mirai, IOT & History of Botnets Ashvini Singhal, Head - Security Operations Center, Akamai
  • 2. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Internet- Threat Lanscape
  • 3. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential DDoS Attack Trends
  • 4. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential What Comes to Mind When your Hear the Word? BotNet
  • 5. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential DDoS Malware Service Disruption Something “Bad”
  • 6. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential A group of internet-connected devices controlled by a central system What does a BotNet Really Mean?
  • 7. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Lee Enfield No.4 Mk2 Firepower - Then
  • 8. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Firepower - NOW
  • 9. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential What made it so EASY?
  • 10. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential IOT – Internet of Things
  • 11. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Large Attacks – Q3 2016
  • 12. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Large Attacks – Q4 2016
  • 13. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Botnet Attacks
  • 14. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Mirai- Botnet
  • 15. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Mirai (Japanese for “The Future”) What is Mirai? This tool achieved particular notoriety for its specific targeting of IoT devices, such as IP cameras, WiFi-connected refrigerators, unsecured home routers, etc
  • 16. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential 3 Typical Attack Targets: • Datacenter routing • DNS • Application Problem is, if any of the 3 are taken out, the entire enterprise is taken out Unlike many Attack Bots, Mirai can be very specifically aimed at all 3 targets with great accuracy Mirai Baseline
  • 17. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Mirai – Attack Vector
  • 18. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Command and Control Report server Infection server Manually Infected IoT Device Component's of the Mirai Bot Net
  • 19. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Life Form
  • 20. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 1.1.1.1 admin admin✓ 1.1.1.1 admin admin ✓ The IoT Bot scans the internet for other devices and test default username and password combosSuccessful results are sent to the Report server.Report server sends results to the Infection server to infect new bot.Bots come online and connect to the C2 for instructs and maintain heartbeatBots come online and connect to the C2 for instructs and maintain heartbeat and restarts processes. C2 Report Infection BasicAnatomy IoT infection
  • 21. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Mirai – Scanning
  • 22. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Mirai Attack – DNS Variant
  • 23. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Mirai Attack – Broad Spectrum Attack
  • 24. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential What Can You Do? Phase 1 • Strict access controls on your firewall(Datacenter, Web and DNS) Phase 2 • Loosen your Phase I controls to bring secondary services back online Phase 3 • Bring all services back online KNOW YOUR ENVIRONMENT
  • 25. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. A Pervasive Platform: • Every major city • Every major network • One network hop away from 95% users Accelerating: • 5 of the top 5 high tech firms • 3 of the top 3 stock exchanges • 5 of the top 5 M&E firms • 5 of the top 5 ecommerce firms Akamai has 400+ customers in India, including the who’s who of the Indian Enterprise! Akamai in India
  • 26. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. 216,000+ servers 1,500+ networks 650+ cities 120+ countries A GLOBAL PLATFORM All top 60 eCommerce sites All top 30 M&E companies All branches of the U.S. military All top 10 banks DELIVERING 13+ MILLION HOSTNAMES 40+ million hits per second 2+ trillion deliveries per day 30+ terabits per second ACCELERATING DAILY TRAFFIC OF Akamai Today Delivering 15-30+% of All Web Traffic
  • 27. ©2015 AKAMAI | FASTER FORWARDTM Akamai Confidential Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Thank You!