Mirai Botnet
Back to Recollections
Intermediate
2016

Mirai Botnet

Target: IoT Devices
Impact: Internet Disruption

Operational Briefing

Assemble a massive botnet of insecure IoT devices using default credentials. Launch record-breaking DDoS attacks.

The Full Story

Mirai (Japanese for "Future") is malware that turns networked devices running Linux into remotely controlled bots. It primarily targets IoT devices such as IP cameras and home routers.

In 2016, it was used to launch a massive DDoS attack against Dyn (a major DNS provider), rendering sites like Twitter, Netflix, and Reddit inaccessible for millions.

Technical Analysis

Propagation

  • Scanning: Mirai constantly scans for IoT devices with telnet ports (23 and 2323) open.
  • Brute Force: Uses a hardcoded list of 62 common default usernames and passwords (e.g., admin/admin, root/12345).
  • Attack: Once part of the botnet, devices participate in high-volume UDP, TCP, and HTTP floods.

Available Modes

Offensive
Replicate the attack vector
Defensive
Harden systems & patch
Analysis
Forensic investigation

Event Timeline

Aug 2016
Mirai first discovered by MalwareMustDie.
Sept 2016
Attack on Krebs on Security blog (620 Gbps).
Oct 2016
Attack on Dyn DNS disrupts US internet.
Oct 2016
Source code leaked on Hackforums.
#IoT#Botnet#DDoS