Industryweek 12367 Mirai Tattoo

Are Mirai Hackers Testing or Flexing?

Nov. 10, 2016
“The supreme art of war is to subdue the enemy without fighting.”  —Sun Tzu

Last week, hackers targeted an infrastructure provider in Liberia with the botnet Mirai. Early reports suggested that the entire country had been knocked offline, but, in reality, the country suffered isolated outages, according to most reports. The country's telecom authority downplayed the impact of the DDoS attack in an interview with BBC but acknowledged that a cell provider there had suffered intermittent online attacks that disrupted its service.

Even if the first reports of the attack exaggerated its impact, the possibility of hackers targeting a nation state remain.

“The question I am asking is: 'Why Liberia?' There is not much to gain financially by attacking that country,” asks Thomas Pore, director of IT and Services at Plixer.

It is certainly an interesting target. Ravaged by Ebola in 2014, Liberia is one of the poorest countries on the planet. Only a small fraction of its population uses the internet.

One theory is that latest attack was to test denial of service techniques. “The attacks are extremely worrying because they suggest a Mirai operator who has enough capacity to seriously impact systems in a nation state,” writes security researcher Kevin Beaumont in Medium. Beaumont was one of the first people to write about the so-called #14 Mirai botnet.

Some security researchers, theorize that the Liberia attack was a demonstration of power—a virtual flexing of muscles—that could be used to fuel future extortion attempts. Each attack gives hackers renewed ability to threaten: If you don’t pay me, I’ll knock your website or even your whole country offline. “The botnet owner is demonstrating that he wields an asset much more powerful than what currently exists,” said Chris Carlson, vice president of product management at Qualys. “This can force victims to pay extortion to avoid being [attacked] in the first place, or it can force attacked victims to pay extortion faster to restore service.”

Read More

IOT Institute is, like IndustryWeek, powered by Penton, an information services company.

Popular Sponsored Recommendations

2022 ICS/OT Cybersecurity Year in Review

March 13, 2023
The annual Dragos ICS/OT Cybersecurity Year in Review Report is the most comprehensive source for the latest cyber threat intelligence, vulnerabilities, and lessons learned from...

Beware Extreme Software

Sept. 24, 2023
As a manufacturer, you understand the importance of staying ahead of the curve and being proactive in your approach to technology. With the rapid pace of change in the industry...

Navigating Disruption: A Leader’s Guide to Strategy Under Uncertainty

Nov. 1, 2023
AI, sustainability, digital--industrials are facing disruptive forces that are redefining what it takes to win. What got your company where it is today won’t get you where you...

Gain a competitive edge with real-world lessons on private 5G networks

Nov. 16, 2023
The use of private networks in manufacturing applications is rapidly growing. In this paper, we present valuable insights and lessons learned from the field with the goal of enhancing...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!