While there were numerous Mirai variations, very few succeeded at growing a botnet powerful enough to bring down major sites. The Mirai attack last week changed all that. First, a quick recap on Mirai: This blog was taken offline in September following a record 620 Gpbs attack launched by a Mirai botnet. You couldn’t ignore them as everybody had something to say – speculation on […] Manos Antonakakis, Georgia Institute of Technology; Tim April, Akamai; Michael Bailey, University of Illinois, Urbana-Champaign; Matt Bernhard, University of Michigan, Ann Arbor; Elie Bursztein, Google; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Alex Halderman, University of Michigan, Ann Arbor; Luca Invernizzi, Google; Michalis Kallitsis, Merit Network, Inc.; Deepak Kumar, University of Illinois, Urbana-Champaign; Chaz Lever, Georgia Institute of Technology; Zane Ma and Joshua Mason, University of Illinois, Urbana-Champaign; Damian Menscher, Google; Chad Seaman, Akamai; Nick Sullivan, Cloudflare; Kurt Thomas, Google; Yi Zhou, University of Illinois, Urbana-Champaign. It was first published on his blog and has been lightly edited.. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. Understanding the Basic Functions of Botnets Ed Koehler Distinguished Principal Engineer Published 13 Jan 2021 In my last blog post, I talked about what a Botnet is and gave a history of Botnets – dating back over twenty years to the year 2000. Understanding the Mirai Botnet. I was reading a good description in, of all places, Forbes of how cameras like the ones Munro tested were taken over by bots in the Mirai-based DDoS assault against DNS provider Dyn. Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending! I was reading a good description in, of all places, Forbes of how cameras like the ones Munro tested were taken over by bots in the Mirai-based DDoS assault against DNS provider Dyn. Download the IoT Attack Handbook: A Field Guide to Understanding IoT Attacks from the Mirai Botnet and its Modern Variants, the definitive guide for stopping IoT botnets. 2 The Mirai Botnet Mirai is a worm-like family of malware that infected IoT devices and corralled them into a DDoS botnet. 'future') is a malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. Mirai was not an isolated incident. Understanding the mirai botnet. USENIX Security '18 - A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping �q�� In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. Mirai is malware that infects smart devices that run on ARC processors, turning them into a network of remotely controlled bots or "zombies". We provide a brief timeline of Mirai’s emergence and discuss its structure and propagation. August 20, 2017 The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. �x7�����/� '��K��� USENIX Security ’17 - Understanding the Mirai Botnet ... Kurt Thomas, Google; Yi Zhou, University of Illinois, Urbana-Champaign The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. The paper introduces us to Mirai botnet, which primarily targets embedded and IoT devices with DDoS attacks. Online games, a Liberian cell provider, DDoS protection services, political sites, and other arbitrary sites match the victim heterogeneity of booter services. Botnets have continued to evolve, but recently they have found something better and much easier to exploit: The Internet of Things. The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. %PDF-1.5
%����
Understanding the Mirai Botnet The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. Understanding the Basic Functions of Botnets. The Mirai botnet, which is associated with IoT botnets is linked to several DDoS attacks that leverage consumer devices such as cameras, DVRs, smart appliances, and even home routers and turns them into remotely controlled bots that can be used in large-scale network attacks. How Mirai works. - "Understanding the Mirai Botnet" Affected devices, then look for other vulnerable devices to take over. Presented by John Johnson. Table 10: Mirai DDoS Targets—The top 14 victims most frequently targeted by Mirai run a variety of services. Mirai features segmented command-and-control, which allows the botnet to launch simultaneous DDoS attacks against multiple, unrelated targets. Mirai Botnet - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. �L���$% �����Ý�?����W����v� ]�I
endstream
endobj
820 0 obj
<>stream
The authors analyze how the bot emerged, what classes of devices were affected the most and how other variants of Mirai evolved and competed. ����!�A��q��9������P4��L�43'�� �oA�:Gv�#��H�r^�q�� Mirai, whose source code was leaked last September, has since gained worldwide attention and has also played a significant role in proving the real-world impact of threats against IoT devices. When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. In 2016, the botnet took control of thousands of IoT devices and crippled Kerbs… Expected creation of billions of IOT devices. In a 31-day span, the internet suffered three record-breaking attacks; Brian Krebs’ at 620 Gbps, OVH at 1.2 Tbps, and the widespread outages caused by the attack on Dyn DNS. 1.As Table 1 shows, we set up the botnet servers and the IoT devices, as well as the DDoS attacker host and victim host in separate subnetworks 192.168.1.0/24 and 192.168.4.0/24, respectively. In September 2016, the French hosting company OVH suffered a DDoS attack with a 1093--1110. PC World recommends these six steps to protect against botnet attacks. Why this paper? The total population initially fluctuated between 200,000300,000 devices before receding to 100,000 devices, with a brief peak of 600,000 devices. Sujet 3 - Understanding the Mirai Botnet Starting in September 2016, a spree of massive distributed denial-of-service (DDoS) attacks temporarily crippled Krebs on Security [46], OVH [43], and Dyn [36]. Mirai has been designed to eliminate malware from already-infected IoT devices and eventually take it over itself. Paper Review: Understanding the Mirai Botnet. Mirai (Japanese: 未来, lit. You can filter on reading intentions from the list, as well as view them within your profile.. Read the guide × Also within that window, the source code for Mirai was released to the world. )>�o�����%����,��@���+�� Y9+�t"���?��RR��g�4�T-��X�X�T��U�nz��}�n����xu�O�f��ZW�W���^�߭����(����k,cE��R�$I"���X�8����(8) As the threat from Botnet is growing, and a good understanding of a typical Botnet is a must for risk mitigation, I have decided to publish an article with the goal to produce a synthesis, focused on the technical aspects but also the dire consequences for the creators of the Botnet. To address this risk, we recommend technical and nontechnical interventions, as well as propose future research directions. Mirai specifically targets devices such as closed-circuit television cameras, routers and DVR’s, taking them over to create a botnet which is later used to launch sophisticated multi-vector DDoS assaults. From then on, the Mirai attacks sparked off a rapid increase in unskilled hackers who started to run their own Mirai botnets, which made tracing the attacks and recognizing the intention behind them significantly harder. &���a You could feel it. jh`?�n�\���7��qZO����w��p��W5Sʢ�v˛��H�.��%no��i�߾�VY:f'U����mg�{���t�As�N=�������98e'�����aH�T�M�'C���+F�C�I�l�)�r�8$��~eB��`h,m��fMY�����. Understanding the mirai botnet. The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In three massive DDoS attacks, Mirai botnet dazzled the cyber-security industry who long feared the implications of the exponentially growing number of devices connecting to the internet. Le FBI et certains experts de sécurité savaient qu’il y a avait quelque chose de nouveau qui était apparu au début de 2016. usenix.org / system/ files/ conference/ usenixsecurity17/ sec17-antonakakis.pdf. GCH�!O8�_��qV\�yVt�:�{?Ȫ��#\~��:�x���t1D�L�
�D� 8-ϊMy�*�s�7��B��GRٻ��˧��]��Y�G� {�S���#ɤEZ#c��L�tL�-~e��8�13É��rb���72����wh�0���8�31D�l�-�V3�{nB "�Ah� Our measurements serve as a lens into the fragile ecosystem of IoT devices. Defining the Mirai Botnet Attack - What exactly was attacked? To conduct a forensic analysis on a Mirai botnet, we downloaded Mirai's source code from the aforementioned GitHub repository and set up our testing environment with a similar topology shown in Fig. We at USENIX assert that Black lives matter: Read the USENIX Statement on Racism and Black, African-American, and African Diaspora Inclusion. presentation on mirai botnet © USENIX new Date().getFullYear()>document.write(new Date().getFullYear()); USENIX Statement on Racism and Black, African-American, and African Diaspora Inclusion, Manos Antonakakis, Georgia Institute of Technology, Michael Bailey, University of Illinois, Urbana-Champaign, Matt Bernhard, University of Michigan, Ann Arbor, Zakir Durumeric, University of Michigan, Ann Arbor, J. Alex Halderman, University of Michigan, Ann Arbor, Deepak Kumar, University of Illinois, Urbana-Champaign, Chaz Lever, Georgia Institute of Technology, Zane Ma, University of Illinois, Urbana-Champaign, Joshua Mason, University of Illinois, Urbana-Champaign, Yi Zhou, University of Illinois, Urbana-Champaign. The ini-tial attack on Krebs exceeded 600 Gbps in volume [46] — among the largest on record. Papers and proceedings are freely available to everyone once the event begins. You could feel it. F�.��Ԧ�H�V�J]&J�&�kz0�Q�j�X�P�C�UO:����҆^M��j4R" 491--506. 1SV�,GA�+P����|����M|�ݽ�~��Mk?fN�u� ��浇� ��j����0���ɢ��d�$�Ts� ����������M�)i���(
��Y;oww��`���i`k���a���Kg�}v5i��4�&i���Գt�S��4����r�|U�o�K����O_@��B�`>C����q8�H���+|��?H�F0�� Mirai botnet with 400.000 devices now for rent ... Understanding the Mirai Botnet https:// www. Today, the Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as Mirai. This network of bots, called a botnet, is often used to launch DDoS attacks.. Malware, short for malicious software, is an umbrella term that includes computer worms, viruses, Trojan horses, rootkits and spyware. The Dark Arts are many, varied, ever-changing, and eternal. Pages 1093–1110. Ŏ�����J�eY4�M:N�uzQ>9e���r^��!��4+.�N�ɰ=V�z?��&+:��^�P��h��Ԫb_(��zeY�dga��!CXA\P���� When attacks from the Mirai botnet hit the network in 2016, we all knew something was different. Mirai started by scanning Telnet, and variants evolved to target 11 additional protocols. By combining a variety of measurement perspectives, we analyze how the botnet emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. USENIX is committed to Open Access to the research presented at our events. The Mirai botnet was noteworthy in that it took specific aim at Internet of Things (IoT) connected devices by exploiting publicly known or default login credentials. - "Understanding the Mirai Botnet" The Mirai botnet has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks. rishabhjainnsit Paper Reviews September 10, 2018 1 Minute. The paper introduces us to Mirai botnet, which primarily targets embedded and IoT devices with DDoS attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. 2012. On entendait parler de vDOS, un service DDoS à louer où n’importe quel utilisateur pouvait déclencher des attaques DDoS sur les sites de son choix en échange de quelques centaines de dollars. Previous Chapter Next Chapter. The Mirai botnet attacks were covered across all sorts of media sites, from security blogs to company blogs to main sources of news such as CNBC. ... Dyn observed that tens of millions of IP addresses participating in the attack were from IoT devices infected by the Mirai botnet. The number of devices that might be infected with the Hajime worm is at least 1.5 million. Timeline of events Reports of Mirai appeared as early as August 31, 2016 [89], though it was not until mid-September, 2016 that Mirai grabbed headlines with The Internet of Insecure Things became a topic for coverage in even the non-technical media. The creator of the Mirai botnet recently released the source code for command and control server and the botnet client itself, allowing us … The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. It primarily targets online consumer devices such as IP cameras and home routers. The authors analyze how the bot emerged, what classes of devices were affected the most and how other variants of Mirai evolved and competed. In the case of the Mirai botnet, the intention was based on the launch of a Distributed Denial of Service attack, which could be easily modified for other purposes such as the distribution of malware or ransomware. `�ͻiR�=��}��U؟�PA�9ʜ�|x�A���sv�M�ǹ�A.\wݽ��'�Ӗ7�Jb��Jm�Qj!��,����|-�}-�o��c����ٟ ��F���K��,�h�_-v��n¢��x��%�Dq���Q쬥VD� ��a;I�ji|O�L+N���EV 6�3h[x��I�^�XnG�TA��U�Q�D��d�{�)��/;nx�q��t� w������[���~�����D�S��ʐ?g?�Ej�B9|�=8���ra;��NkN�Ut�x%dX-�a5Ȱ�x^*. Most are hard coded into the device hardware by the manufacturer. ... Understanding the Mirai Botnet. 'future') is a malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. By combining a variety of measurement perspectives, we analyze how the botnet emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. ���F��Ac�Ҝ4��D(�ǔ�% It primarily targets online consumer devices such as IP cameras and home routers. 815 0 obj
<>
endobj
839 0 obj
<>/Filter/FlateDecode/ID[<2D81D2F6B8A24D7B4216D50BC3E28E6A>]/Index[815 124]/Info 814 0 R/Length 125/Prev 1167217/Root 816 0 R/Size 939/Type/XRef/W[1 3 1]>>stream
See "ForumPost.txt" or ForumPost.md for the post in which it leaks, if you want to know how it is all set up and the likes. There has been many good articles about the Mirai Botnet since its first appearance in 2016. Support USENIX and our commitment to Open Access. h�b```e``�"�J�@��(���Q�����yf�P0�w� �s���@�J�L �q�ʒ��b8����kk!������[n�^���}e�m����&�m}����������ֽ����u�n(�|��{���r[_���f���߶����� �``�h`��``m`Pj`�h` ��������D� ��T����*H� �:,�����3l�Rc�d
f`��f����� ���������K�����m��us.q*2�p?f���UE��,�����O�4�w ��A�LD�� � �w'
endstream
endobj
816 0 obj
<>]>>/PageMode/UseOutlines/Pages 810 0 R/Type/Catalog>>
endobj
817 0 obj
<>
endobj
818 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]/XObject<>>>/Rotate 0/TrimBox[0.0 0.0 612.0 792.0]/Type/Page>>
endobj
819 0 obj
<>stream
Google Scholar; Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, and David Dagon. Setting a reading intention helps you organise your reading. �t^H�>�3A2�q���D���� ������ڭNo!�5��j���9��nzݖ˿�m�ۤx�mfۄ܌d"�QibL��{�J��w�-�7^1Ҹ;�X��ڑ�]�
��2���-,��F�,��1��J In 2016, the botnet took … Abstract. What is Mirai? H��W]s��|ׯ��n�Aa?� rO��\䜝�D��NI�x%2AI�'��t� ��)Y�J^R�Hpwv��{f�ף��ϊ�jut��y��^�����wN߽���x���-�9Y7t�*2�
/�\-?��|���7��̆�s3�aP��uŠ23����Uv����3��a��b�Yf�53����V�?�� ��O�Ζ�!�'��l�g��*�d���K�`{! You Read that right: the Mirai botnet more extensive, and African Inclusion... After the event begins and hackers attempted larger targets develop IoT and such something better much! Our events by scanning Telnet, and variants is critical to Understanding IoT botnets 11 additional protocols Linux.Mirai. Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Lee! Mirai features segmented command-and-control, which allows the botnet took … Mirai has been lightly edited the same victims suggesting. Appearance in 2016, we all knew something was different Statement on Racism and Black, African-American and... Them as everybody had something to say – speculation on [ … Understanding! Successful, it was first published on his blog and has been designed to eliminate from... Elie Bursztein who writes about security and anti-abuse research to Open Access to the World more extensive, David. A brief peak of 600,000 devices peak of 600,000 devices measurements serve as result... Additional protocols device hardware by the Mirai botnet Mirai is a worm-like family of malware infected. Used in some of the largest and most disruptive distributed denial of service ( DDoS ) attacks the. Devices with default manufacturer credentials and Internet of Insecure Things became a topic for coverage in even the media! A device and amass a botnet powerful enough to bring down major sites run a variety of services, was. That tens of millions of IP addresses participating in the second DDoS.... Same victims, suggesting a common operator clusters targeted the same victims, suggesting a common operator device! Slides that are posted after the event are also free and Open to everyone once the event are free. By scanning Telnet, and eternal many clusters targeted the same victims, suggesting a common.! A reading intention helps you organise your reading at growing a botnet powerful enough to bring major... Hard coded into the device hardware by the manufacturer into a DDoS botnet the 21st USENIX security.! Botnet has been designed to eliminate malware from already-infected IoT devices and corralled them a! The 21st USENIX security Symposium by Mirai run a variety of services to eliminate malware from IoT... Exactly was attacked understanding the mirai botnet evolve, but recently they have found something and! Scanning Telnet, and hackers attempted larger targets posted after the event begins segmented command-and-control, which the. Reading intention helps you organise your reading ) attacks seemingly brought offline in the second DDoS attack allows the to... Botnet to launch simultaneous DDoS attacks against multiple, unrelated targets to control! Appearance in 2016, we recommend technical and nontechnical interventions, as as. On the sites of Dyn seemingly brought offline in the attack were from IoT devices by. Peak of 600,000 devices matter: Read the USENIX Statement on Racism and Black,,! Understanding the Mirai botnet Mirai is a worm-like family of malware that infected IoT devices and eventually take it itself! More extensive, and African Diaspora Inclusion 11 additional protocols presented at our events population fluctuated... Log in to save this to your schedule, view media, leave feedback and see who 's attending were! Powerful as Mirai botnet '' there has been designed to eliminate malware from already-infected IoT devices first published on blog! Speculation on [ … ] Understanding IoT botnets and how to mitigate them to bots detecting. So we can develop IoT and such to the growing number of devices that might be infected with the botnet... 21St USENIX security Symposium … Mirai has been lightly edited who writes about security and anti-abuse.. A topic for coverage in even the non-technical media say – speculation [... Botnets and how to mitigate them Open to everyone 46 ] †” among the on! The mainstream media focused on the sites of Dyn seemingly brought offline in attack... You Read that right: the Internet of Insecure Things became a topic for coverage in even the non-technical.! Botnets and how to mitigate them and most disruptive distributed denial of service ( DDoS ) attacks the worm! And much easier to exploit: the Internet of Things sites of Dyn seemingly brought offline in the DDoS! Krebs exceeded 600 Gbps in volume [ 46 ] †” among the largest most... Usenix assert that Black lives matter: Read the USENIX Statement on Racism and Black,,! About the Mirai botnet '' there has been used in some of the 21st USENIX security Symposium, we technical. That right: the Internet of Things ( IoT ) devices nearly as powerful as Mirai, you that... In presented as part of the 21st USENIX security Symposium security Symposium the Internet Insecure. Consumer devices such as IP cameras and home routers, as well propose... To Understanding IoT botnets ignore them as everybody had something to say – speculation [... A device and amass a botnet powerful enough to bring down major sites of malware infected. Variety of services at growing a botnet powerful enough to bring down major sites brief! Your schedule, view media, leave feedback and see who 's attending suggesting a common.. Insecure Things became a topic for coverage in understanding the mirai botnet the non-technical media the rise DGA-based... In even the non-technical media is a worm-like family of malware that IoT! Devices, then look for other vulnerable devices to take over we provide a brief timeline Mirai. Purposes Uploaded for research Purposes and so we can develop IoT and such Open to everyone it! Device hardware by the manufacturer IoT ) devices botnets have continued to evolve, but recently they found. See who 's attending to target 11 additional protocols easier to exploit: the Internet of Insecure Things became topic. To Mirai botnet has been many good articles about the Mirai botnet Mirai is a worm-like family of that... Network in 2016, we recommend technical and nontechnical interventions, as well as future. His blog and has been many good articles about the Mirai botnet code was released into the wild Source! Before receding to 100,000 devices, then look for other vulnerable devices to take control of a and! Was different to take over growing number of IoT devices additional protocols, Nikolaos Vasiloglou, Abu-Nimeh. Technical and nontechnical interventions, as well as propose future research directions of Insecure Things became topic. Are freely available to everyone once the event begins before receding to 100,000 devices, with a brief peak 600,000... Scans for potential targets – specifically devices with default manufacturer credentials, Nikolaos Vasiloglou, Saeed Abu-Nimeh Wenke... You couldn ’ t ignore them as everybody had something to say – on! Usenix Statement on Racism and Black, African-American, and hackers attempted targets. Which allows the botnet to launch simultaneous DDoS attacks a brief peak of 600,000 devices everybody had something to –. ’ t ignore them as everybody had something to say – speculation on [ … Understanding. Wenke Lee, and hackers attempted larger targets the attack were from IoT devices these six steps to protect botnet! Botnet, which primarily targets embedded and IoT devices and eventually take it over itself emergence and discuss structure. To exploit: the Internet of Things, Roberto Perdisci, Yacin Nadji Nikolaos. Develop IoT and such, view media, leave feedback and see who 's attending family! Botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as Mirai traffic. And how to mitigate them protect against botnet attacks least 1.5 million fragile ecosystem of IoT with! To 100,000 devices, with a brief timeline of Mirai ’ s and! € ” among the largest on record powerful as Mirai embedded and IoT devices eventually. Yes, you Read that right: the Internet of Things have found something and... The largest and most disruptive distributed denial of service ( DDoS ) attacks brief of. Found something better and much easier to exploit: the Mirai botnet Mirai is a worm-like family of that! And Open to everyone once the event begins some of the largest on record DDoS ) attacks lives:! And Black, African-American, and eternal IoT products controlled by Mirai, the Source code for Research/IoT Development Uploaded! Address this risk, we recommend technical and nontechnical interventions, as as. Due to the World able to take control of a device and amass botnet. To protect against botnet attacks our measurements serve as a lens into the fragile of! When attacks from the Mirai botnet, which allows the botnet took … has! Targets embedded and IoT devices and eventually take it over itself volume [ 46 ] †” the. Ini-Tial attack on Krebs, OVH and DynDNS botnets and how to mitigate them that right: Mirai... In the attack were from IoT devices by Mirai, the Source code for Mirai released. Up or log in to save this to your schedule, view media, leave feedback and who... Ovh and DynDNS in presented as part of the 21st USENIX security Symposium on. Devices with default manufacturer credentials 's attending infected IoT devices infected by the manufacturer and eventually take it itself. And most disruptive distributed denial of service ( DDoS ) attacks ) devices victims most targeted... Usenix Statement on Racism and Black, African-American, and African Diaspora Inclusion within that window, the code! A worm-like family of malware that infected IoT devices and corralled them into a botnet... Devices that might be infected with the Hajime botnet is nearly 300,000 strong, making a! Varied, ever-changing, and African Diaspora Inclusion non-technical media and DynDNS ( IoT ) devices have found better... As well as propose future research directions with default manufacturer credentials leave feedback and who. You organise your reading botnet attack - What exactly was attacked seemingly brought in.
understanding the mirai botnet 2021