Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig1 Katura Harvey1;2 George Hughey1 Richard Roberts1;2 Dave Levin1 1University of Maryland 2Max Planck Institute for Software Systems (MPI-SWS) {smherwig, katura}@cs.umd.edu,
[email protected], {ricro, dml}@cs.umd.edu Abstract—The Internet of Things (IoT) introduces an unprece- While there have been in-depth studies into the kinds of dented diversity and ubiquity to networked computing. It also attacks that IoT botnets have launched [8], as well as the introduces new attack surfaces that are a boon to attackers. vulnerabilities that make IoT botnets able to flourish [6], The recent Mirai botnet showed the potential and power of a [37], there remains much to understand about the underlying collection of compromised IoT devices. A new botnet, known as makeup of the vulnerable IoT devices themselves. For exam- Hajime, targets many of the same devices as Mirai, but differs ple: In what countries do more vulnerable devices reside? IoT considerably in its design and operation. Hajime uses a public peer-to-peer system as its command and control infrastructure, devices are often embedded devices; what architectures are and regularly introduces new exploits, thereby increasing its more vulnerable, and where are various architectures more resilience. popular? How large can a global IoT botnet grow today? Can an IoT botnet propagate software updates rapidly and We show that Hajime’s distributed design makes it a valu- thoroughly? able tool for better understanding IoT botnets. For instance, Hajime cleanly separates its bots into different peer groups To answer these questions and more, we present in this depending on their underlying hardware architecture.