UPDATED 23:51 EDT / APRIL 23 2017

EMERGING TECH

Vigilante bot takes the good fight to Mirai by securing vulnerable IoT devices

A mysterious Internet of Things bot first identified in October is now believed to be the work of a vigilante hacker who is attempting to block infections from nefarious bots such as the notorious Mirai.

According to Waylon Grange at Symantec Corp., the Hajime bot, which was first believed to be an undeveloped bot that might be later used for distributed denial of services attacks, instead blocks access to ports exploited by other forms of IoT malware.

The strangeness of Hajime doesn’t stop there. The bot seemingly was created to avoid takedowns by using peer-to-peer networking to push command modules versus a typical centralized command-and-control server address. Hijame contacts its P2P C&C every 10 minutes for an update, and if an update is sent, the signature includes the following message:

Just a white hat, securing some systems.
Important messages will be signed like this!
Hajime Author.
Contact CLOSED
Stay sharp!

Along with a number of other methods employed to avoid detection, the only major update to the bot since it was launched was to make adjustments to its code after a Rapidity Networks report on it noted flaws in the code. To put that more simply, despite having ample opportunity to weaponize the bot, the creator has, over the period of six months, only improved the code based on a third-party report versus changing it to do something bad.

Grange isn’t able to put a hard figure on how many IoT devices Hijame has infected but he notes that it has spread rapidly and infection rates would be at least in the tens of thousands. Interestingly, Hijame is also not the first case of a vigilante attempting to secure vulnerable IoT devices with malware called Linux.Wifatch in 2014 said to have attempted to secure devices in a similar way, though less successfully than Hijame.

Hijame presents an interesting quandary. On one hand, it would be far preferable if outside code never infected IoT devices, not only because the act itself is illegal but because no one likes to see devices infected with anything. On the other hand, the white-hat hacker behind the bot is seemingly doing IoT device holders a massive favor by securing devices against malicious bot attack.

Perhaps the answer to the quandary is that lazy manufacturers with their appallingly vulnerable IoT devices should simply follow Hijame’s lead and block the ports used by Mirai and the like from the very beginning.

Photo: US Airforce/Public Domain

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.