Recent from talks
Nothing was collected or created yet.
BASHLITE
View on Wikipedia| BASHLITE | |
|---|---|
| Malware details | |
| Technical name | As BashLite
As Gafgyt
As QBot
As PinkSlip
|
| Aliases | Gafgyt, Lizkebab, PinkSlip, Qbot, Torlus, LizardStresser |
| Type | Botnet |
| Author | Lizard Squad |
| Technical details | |
| Platform | Linux |
| Written in | C |
BASHLITE (also known as Gafgyt, Lizkebab, PinkSlip, Qbot, Torlus and LizardStresser) is malware which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS).[1] Originally it was also known under the name Bashdoor,[2] but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.[3]
The original version in 2014 exploited a flaw in the bash shell - the Shellshock software bug - to exploit devices running BusyBox.[4][5][6][7] A few months later a variant was detected that could also infect other vulnerable devices in the local network.[8] In 2015 its source code was leaked, causing a proliferation of different variants,[9] and by 2016 it was reported that one million devices have been infected.[10][11][12][13]
Of the identifiable devices participating in these botnets in August 2016 almost 96 percent were IoT devices (of which 95 percent were cameras and DVRs), roughly 4 percent were home routers - and less than 1 percent were compromised Linux servers.[9]
Design
[edit]BASHLITE is written in C, and designed to easily cross-compile to various computer architectures.[9]
Exact capabilities differ between variants, but the most common features[9] generate several different types of DDoS attacks: it can hold open TCP connections, send a random string of junk characters to a TCP or a UDP port, or repeatedly send TCP packets with specified flags. They may also have a mechanism to run arbitrary shell commands on the infected machine. There are no facilities for reflected or amplification attacks.
BASHLITE uses a client–server model for command and control. The protocol used for communication is essentially a lightweight version of Internet Relay Chat (IRC).[14] Even though it supports multiple command and control servers, most variants only have a single command and control IP-address hardcoded.
It propagates via brute forcing, using a built-in dictionary of common usernames and passwords. The malware connects to random IP addresses and attempts to login, with successful logins reported back to the command and control server.
See also
[edit]- Denial-of-service attack (DoS)
- Fork bomb
- Hajime (malware)
- LOIC
- High Orbit Ion Cannon – the replacement for LOIC used in DDoS attacks
- Low Orbit Ion Cannon – a stress test tool that has been used for DDoS attacks
- Mirai (malware)
- ReDoS
- Slowloris (computer security)
References
[edit]- ^ Cimpanu, Catalin (30 August 2016). "There's a 120,000-Strong IoT DDoS Botnet Lurking Around". Softpedia. Retrieved 19 October 2016.
- ^ Tung, Liam (25 September 2014). "First attacks using shellshock Bash bug discovered". ZDNet. Retrieved 25 September 2014.
- ^ Ashford, Warwick (30 June 2016). "LizardStresser IoT botnet launches 400Gbps DDoS attack". Computer Weekly. Retrieved 21 October 2016.
- ^ Kovacs, Eduard (14 November 2014). "BASHLITE Malware Uses ShellShock to Hijack Devices Running BusyBox". SecurityWeek.com. Retrieved 21 October 2016.
- ^ Khandelwal, Swati (November 17, 2014). "BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox". The Hacker News. Retrieved 21 October 2016.
- ^ Paganini, Pierluigi (16 November 2014). "A new BASHLITE variant infects devices running BusyBox". Security Affairs. Retrieved 21 October 2016.
- ^ "Bash Vulnerability (Shellshock) Exploit Emerges in the Wild, Leads to BASHLITE Malware". Trend Micro. 25 September 2014. Retrieved 19 March 2017.
- ^ Inocencio, Rhena (13 November 2014). "BASHLITE Affects Devices Running on BusyBox". Trend Micro. Retrieved 21 October 2016.
- ^ a b c d "Attack of Things!". Level 3 Threat Research Labs. 25 August 2016. Archived from the original on 3 October 2016. Retrieved 6 November 2016.
- ^ "BASHLITE malware turning millions of Linux Based IoT Devices into DDoS botnet". Full Circle. 4 September 2016. Archived from the original on 22 October 2016. Retrieved 21 October 2016.
- ^ Masters, Greg (31 August 2016). "Millions of IoT devices enlisted into DDoS bots with Bashlite malware". SC Magazine. Retrieved 21 October 2016.
- ^ Spring, Tom (30 August 2016). "BASHLITE Family of Malware Infects 1 Million IoT Devices". Threatpost.com. Retrieved 21 October 2016.
- ^ Kovacs, Eduard (31 August 2016). "BASHLITE Botnets Ensnare 1 Million IoT Devices". Security Week. Retrieved 21 October 2016.
- ^ Bing, Matthew (29 June 2016). "The Lizard Brain of LizardStresser". Arbor Networks. Retrieved 6 November 2016.
BASHLITE
View on GrokipediaOverview
Discovery and Initial Naming
BASHLITE was first detected in September 2014 by security researchers shortly after the disclosure of the ShellShock vulnerability (CVE-2014-6271), a critical flaw in the Bash shell that allowed remote code execution on affected Linux systems.[1] The malware emerged amid widespread exploitation attempts targeting vulnerable servers and embedded devices, with early detections tied to scans leveraging the newly revealed Bash weakness.[7] Trend Micro researchers coined the name BASHLITE to reflect the malware's reliance on the Bash shell for propagation and infection, releasing a dedicated scanner tool just days after ShellShock's public reveal on September 24, 2014.[7] This naming highlighted its Linux-specific nature and distinguished it from prior botnet threats. Subsequent analyses confirmed its focus on commandeering Linux-based IoT devices for coordinated attacks.[8] As awareness grew, other security firms adopted alternative designations based on observed samples and behaviors, including Gafgyt by Trend Micro in parallel references, Lizkebab, Torlus, and Qbot by various researchers tracking its variants.[1][8] Early reports from firms like Trend Micro linked BASHLITE to a surge in Linux infections, particularly on unsecured embedded systems, setting the stage for its role in broader DDoS botnet ecosystems.[9]Core Purpose and Operations
BASHLITE is a malware family designed primarily to infect Linux-based systems and Internet of Things (IoT) devices, enlisting them into a botnet for conducting distributed denial-of-service (DDoS) attacks.[10][1] Its core objective is to overwhelm targeted servers, websites, or networks with excessive traffic, rendering them inaccessible to legitimate users.[11] By exploiting vulnerabilities and weak credentials, BASHLITE transforms everyday connected devices—such as routers, cameras, and digital video recorders—into unwitting participants in these attacks.[12] The operational workflow of BASHLITE begins with the compromise of vulnerable devices, often through scanning for open telnet or SSH ports and attempting logins with default or common credentials.[10] Once infected, the malware establishes a connection to a command-and-control (C2) server, where it awaits instructions from the botnet operator.[11] Upon receiving commands, infected devices execute coordinated flood-based DDoS attacks, such as TCP or UDP floods, directing traffic toward specified IP addresses or domains to exhaust the target's resources.[10] This process allows the botnet to scale attacks rapidly by leveraging the collective bandwidth of numerous compromised systems.[1] BASHLITE demonstrated significant scale potential from its emergence. By mid-2016, research identified over 1 million devices under its influence across multiple C2 servers, highlighting its ability to amass large armies of bots primarily from IoT ecosystems.[1] This growth underscored the malware's reliance on the expanding proliferation of unsecured connected devices.[10]Technical Architecture
Infection Vectors
BASHLITE primarily infects devices by exploiting the Shellshock vulnerability (CVE-2014-6271) in the GNU Bash shell, targeting Linux-based systems through HTTP requests to vulnerable web servers or CGI scripts that invoke Bash.[13] This method allows attackers to execute arbitrary commands remotely, downloading and running malware payloads such as scripts (e.g., bin.sh) that install the botnet agent on unpatched embedded devices, including those using BusyBox for lightweight Unix-like environments common in IoT hardware.[13] In addition to Shellshock, BASHLITE spreads by scanning for open Telnet (ports 23 and 2323) and SSH ports on internet-connected devices, attempting logins with a hardcoded list of weak or default credentials, such as "admin," "root," or "123456."[1][14] This brute-force approach exploits factory-default settings on IoT devices like routers, DVRs, and IP cameras from manufacturers such as Dahua, Zyxel, and Huawei, which often ship with enabled remote access and unchanged passwords.[1] The malware focuses on Linux-based embedded systems and unpatched servers, prioritizing those exposed to the internet via Shodan-like scans for vulnerable ports and services, enabling rapid propagation across networks of IoT devices with minimal security configurations.[1][14]Command and Control Structure
BASHLITE utilizes a centralized command and control (C2) architecture centered on dedicated servers that manage communications with infected IoT devices through a custom protocol modeled after Internet Relay Chat (IRC). The malware embeds hardcoded IP addresses of these C2 servers directly into its binary, enabling bots to connect immediately after infection without relying on dynamic resolution. These servers, frequently hosted on cloud providers or content delivery networks, allow operators to broadcast directives to thousands of compromised devices simultaneously, with analysis identifying 486 unique C2 IPs distributed across 93 autonomous systems in 32 countries.[15] The communication protocol operates over unencrypted TCP connections in plaintext, emulating IRC functionality while remaining lightweight to suit resource-constrained IoT hardware. Bots initiate sessions with C2 servers, typically on IRC-standard port 6667, though propagation often involves Telnet interactions on port 23. Commands are formatted as simple strings prefixed by an exclamation mark, such as!* TCPFLOOD <target IP> <port> <duration> <threads> <flags>, which instruct bots to execute specific actions; observed commands fall into categories like attacks (66.4% of traffic), management (18.4%), and interrupts (13.1%), with keep-alive PING/PONG messages exchanged every 60 seconds to sustain connections.[15][16]
For sustained operation and botnet growth, BASHLITE integrates self-propagation scripts within infected devices that continuously scan the network for new victims using brute-force credential attacks on Telnet and SSH services. Successful infections are reported back to the C2 server via the IRC-like channel, enabling automated expansion without manual intervention from operators; this mechanism, activated by commands like "!SCANNER ON," ensures the botnet's resilience and scale post-infection.[16]
DDoS Attack Methods
BASHLITE employs a range of volumetric DDoS techniques to flood targets with excessive traffic, primarily leveraging the compromised IoT devices' ability to send high volumes of packets. The core attack methods include TCP SYN floods, which initiate numerous incomplete TCP handshakes to exhaust server resources by filling connection queues with half-open connections; UDP floods, which bombard targets with unsolicited UDP packets to saturate bandwidth; ICMP floods, which send excessive Internet Control Message Protocol (ICMP) echo requests (pings) to overwhelm network resources; GRE floods, which exploit Generic Routing Encapsulation (GRE) packets to generate high-volume traffic; and HTTP GET/POST floods, which overwhelm web servers by simulating excessive legitimate requests at the application layer. These methods target common ports such as 80 (HTTP), 443 (HTTPS), and 53 (DNS), prioritizing simplicity and effectiveness over sophisticated evasion.[10][8][17] The botnet's command and control (C2) infrastructure directs these attacks through straightforward syntax issued to infected bots, typically formatted as " syn", where the "syn" flag specifies the SYN-based variant, instructing bots to generate spoofed SYN packets for the specified time in seconds. Similarly, UDP floods can be commanded as "udpflood
