Massive botnet compromises 30,000+ devices for record-breaking DDoS assault

Cal Jeffrey

Posts: 4,447   +1,585
Staff member
In brief: Don't look now, but your video recorder might be part of a massive botnet pulling off record-breaking sustained DDoS attacks. The network involves compromised Shenzhen webcams and DVRs. The attacks do not appear state-sponsored, but they are very disruptive, with some victims reporting denial of service attacks lasting for days.

Nokia security researchers are tracking a botnet, dubbed Eleven11bot, that has been delivering what is likely the largest directed denial-of-service attack ever recorded. An estimated 30,000 webcams and video recorders make up the massive botnet. The network is international, but Nokia says the highest concentration of compromised devices (24.4%) is in the United States. While not the largest botnet ever recorded, it has pulled off the biggest observed attack ever seen, peaking at 6.5 terabits per second, surpassing the previous record of 5.6 Tbps set in January, according to Cloudflare.

Nokia's Deepfield Emergency Response Team detected Eleven11bot after a surge of geographically dispersed IP addresses launched several "hyper-volumetric attacks" in late February. Unlike traditional exhaustive DDoS attacks that target server resources, volumetric attacks flood networks with massive amounts of data to overwhelm bandwidth capacity. Eleven11bot's hyper-volumetric attacks have targeted communication service providers, game hosting infrastructure, and other sectors, causing disruptions that have lasted up too a week in some cases.

Nokia security researcher Jérôme Meyer noted that most IP addresses involved in these attacks had not previously been associated with DDoS activity, making Eleven11bot's sudden emergence particularly concerning. He also pointed out that the last comparable botnet of this scale was observed in 2022, shortly after the Russian invasion of Ukraine, with approximately 60,000 infected devices.

"This botnet is much larger than what we're used to seeing in DDoS attacks," Meyer said. "Attack intensity has varied widely, ranging from a few hundred thousand to several hundred million packets per second (pps)."

While Nokia initially estimated the botnet to consist of around 30,000 devices, the nonprofit Shadowserver Foundation revised this figure to more than 86,000. Conversely, security firm Greynoise countered with a much lower estimate of fewer than 5,000 devices, with the highest IP activity (61%) originating in Iran. Meyer said Shadowserver's figure was probably an overestimate due to how it identified infected devices, mistakenly assuming that unique device information meant a device was compromised. He remains confident in his team's estimate as repeated attacks originate from the same 20,000-30,000 observed IP addresses.

Greynoise researchers believe Eleven11bot is a new variant of Mirai, the infamous malware that first surfaced in 2016. Mirai-based botnets typically infect Internet of Things (IoT) devices by exploiting default credentials or software vulnerabilities. Researchers believe the Eleven11bot variant uses a newly discovered exploit to compromise Shenzhen TVT-NVMS 9000 digital video recorders running on HiSilicon chips.

To protect against Eleven11bot or any other botnet, experts recommend placing IoT devices behind firewalls, disabling remote administration when not needed, and ensuring devices have strong, unique passwords. Regular firmware updates are also critical in patching vulnerabilities that botnets like Eleven11bot could exploit.

Permalink to story:

 
Decent backdoor strategy. Greedy contractors love to use the cheapest units possible. The good ones will use the indistry standard.
 
Glad to see Nokia is in the business
make 2-port for the need, 4-5 for secure
 
IOT's being hooked up to the internet should be banned.

I can't stand devices such as my wasmachine, electric boiler, TV or coffee machine now all in the need to be hooked up to wireless. By default it's always disabled, and above is exactly why.
I do think the industry needs to get together and allow all IoT devices to checkin into a local box hosted at home, even a cheap Raspberry Pi powered by the USB port of your Router would more than suffice.

Then the only connection out from there would be for firmware updates or if you needed to check something at home remotely.

Would be safer than it currently is now with each device checking into their own clouds constantly, probably would make devices more responsive when at home since the traffic is just traversing your local networks, massively reduced bandwidth since it’s mostly not going out to the internet, plus it’s much easier to harden a single box instead of each individual device.
 
When my ancient CRT television finally went belly up I had no option but to buy a "smart" TV. I was happy to discover that it would still show me content broadcast by satellite without having to allow it access to the internet. I have noticed on several occasions during the night (while shut down) the On/Off indicator is flashing. I assume it is trying to connect to the internet while I sleep. Thankfully my router is blocking the connection.
Take Back Control!
 
Most people that have zero clue about cybersec will keep the default password on a device open to the Internet... So... Good luck.
 
Back