• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Unique “Hide ‘N Seek” IoT Botnet May Be a Sign of What’s to Come

January 25, 2018 By The Editor

The “Hide ‘N Seek” (HNS) Internet of Things botnet is back in action, and now it’s bigger and badder than ever. First spotted in early January 2018, this botnet went M.I.A. for nearly two weeks before researchers at Bitdefender uncovered it once again, with a device count of more than 24,000! What started out as a dozen infected devices in Southeast Asia earlier this month has now become a global phenomenon. How can this level of growth be possible?

HNS owes its alarming momentum to its advanced communication tactics – using custom-built peer-to-peer interactions to rapidly exploit new victims. It also happens to be just the second known botnet to use a decentralized, P2P architecture. According to an SC Magazine report, HNS may represent a concerning and widespread shift in the way cybercriminals seek to leverage botnets. Here’s an excerpt from the article:

“The botnet also uses multiple anti-tampering techniques to prevent a third party from hijacking or poisoning and can perform web exploitations against a series of devices via the same exploit as CVE-2016-10401 and other vulnerabilities against networking equipment.

HNS also embeds a plurality of commands such as data exfiltration, code execution and interference with a device’s operation. The botnet also features a worm-like spreading mechanism that randomly generates a list of IP addresses to get potential targets.”

Read the full article on SC Magazine, and if you’re interested in learning more about what else we might expect to see from IoT botnets in the coming months, check out this 2018 cybersecurity prediction here on Secplicity.

Share This:

Related

Filed Under: Editorial Articles, Featured Tagged With: botnet

Comments

  1. Michael Pekarik says

    January 26, 2018 at 11:14 am

    It would be nice if you said what the botnet exploits instead of just reverencing a CVE number.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use