Hajime (malware)

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Hajime[1]
Written inC[2]
Operating systemLinux[3]
TypeBotnet[4]

Hajime (Japanese for "beginning") is a malware which appears to be similar to the Wifatch malware in that it appears to attempt to secure devices.[5] Hajime is also far more advanced than Mirai, according to various researchers.[6]

Malware[edit]

Hajime is a worm according to sources which have placed research on the subject.[7] It appears to have been discovered as early as October 2016.[8]

Later in April 2017, Hajime generated large media coverage as it appeared to be in competition with Mirai.[9] This led to a number of reports which compared and noted that it appeared to have a similar purpose to Linux.Wifatch.[10] It also did not contain any modules or tools for denial of service attacks, but instead only contained methods for extending its reach.[11]

Hand written assembly code specifically for several platforms was also discovered by researchers as well.[12]

Hajime is similar in the method of how it manages to compromise systems to Mirai.[13] Some of the key differences from Hajime is the fact that it uses a peer to peer network for communications compare to Mirai.[14]

What was also noted was the message the malware left on systems it compromised.[15] The message left on systems compromised by Hajime displayed on terminals is shown below.[16]

Just a white hat, securing some systems.
Important messages will be signed like this!
Hajime Author.
Contact CLOSED Stay sharp!

[17]

See also[edit]

References[edit]

  1. ^ Arghire, Ionut (April 26, 2017). "Mysterious Hajime Botnet Grows to 300,000 IoT Devices: Kaspersky". securityweek.com. Retrieved 14 October 2017.
  2. ^ Cimpanu, Catalin (October 18, 2016). "Hajime IoT Worm Considerably More Sophisticated than Mirai". Softpedia. Retrieved 13 October 2017.
  3. ^ Kan, Michael (April 17, 2017). "IoT malware clashes in a botnet territory battle". PC World. Retrieved 13 October 2017.
  4. ^ Leyden, John (27 April 2017). "Mysterious Hajime botnet has pwned 300,000 IoT devices". The Register. Retrieved 14 October 2017.
  5. ^ Grange, Waylon (18 April 2017). "Hajime worm battles Mirai for control of the Internet of Things". Symantec. Retrieved 13 October 2017.
  6. ^ Paganini, Pierluigi (April 20, 2017). "Symantec is monitoring the Hajime IoT malware, is it the work of vigilante hacker?". securityaffairs.co. Retrieved 13 October 2017.
  7. ^ Vatu, Gabriela (April 21, 2017). "IoT Malware Hajime Fights Against Mirai, Tries to Secure Devices". Softpedia. Retrieved 13 October 2017.
  8. ^ Vatu, Gabriela (April 27, 2017). "Vigilante IoT Worm Hajime Infects 300,000 Devices". Softpedia. Retrieved 13 October 2017.
  9. ^ Spring, Tom (April 21, 2017). "Mirai and Hajime Locked Into IoT Botnet Battle". threatpost. Retrieved 13 October 2017.
  10. ^ Cimpanu, Catalin (April 19, 2017). "Vigilante Hacker Uses Hajime Malware to Wrestle with Mirai Botnets". Bleeping Computer. Retrieved 13 October 2017.
  11. ^ Millman, Rene (April 28, 2017). "Hajime malware now has 300,000 strong botnet at disposal say researchers". scmagazineuk.com. Retrieved 13 October 2017.
  12. ^ Edwards, Sam; Profetis, Ioannis (16 October 2016). "Hajime: Analysis of a decentralized intern et worm for IoT devices" (PDF). rapiditynetworks.com. Retrieved 14 October 2017.
  13. ^ Arghire, Ionut (April 20, 2017). "White Hat Hacker Created Mysterious IoT Worm, Symantec Says". securityweek.com. Retrieved 14 October 2017.
  14. ^ Khandelwal, Swati (April 26, 2017). "Hajime 'Vigilante Botnet' Growing Rapidly; Hijacks 300,000 IoT Devices Worldwide". thehackernews.com. Retrieved 14 October 2017.
  15. ^ "Hajime Botnet – Friend or Foe?". radware.com. 26 April 2017. Retrieved 14 October 2017.
  16. ^ Khandelwal, Swati (April 19, 2017). "To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does". thehackernews.com. Retrieved 14 October 2017.
  17. ^ Paganini, Pierluigi (April 27, 2017). "The Hajime Botnet continues to grow and implements a new attack technique". securityaffairs.co. Retrieved 14 October 2017.