Hajime (malware)
{{Short description|Computer malware}}
{{Infobox Software
| logo =
| screenshot =
| caption =
| collapsible =
| author =
| developer =
| released =
| latest release version =
| latest release date =
| latest preview version =
| latest preview date =
| programming language = C{{cite web | url=http://news.softpedia.com/news/hajime-iot-worm-considerably-more-sophisticated-than-mirai-509423.shtml | title=Hajime IoT Worm Considerably More Sophisticated than Mirai | publisher=Softpedia | date=October 18, 2016 | accessdate=13 October 2017 | author=Cimpanu, Catalin}}
| operating system = Linux{{cite web | url=https://www.pcworld.com/article/3190182/security/iot-malware-clashes-in-a-botnet-territory-battle.html | title=IoT malware clashes in a botnet territory battle | publisher=PC World | date=April 17, 2017 | accessdate=13 October 2017 | author=Kan, Michael}}
| platform =
| size =
| language =
| status =
| genre = Botnet{{cite web | url=https://www.theregister.co.uk/2017/04/27/hajime_iot_botnet/ | title=Mysterious Hajime botnet has pwned 300,000 IoT devices | publisher=The Register | date=27 April 2017 | accessdate=14 October 2017 | author=Leyden, John}}
| license =
| website =
}}
Hajime (Japanese for "beginning") is a malware which appears to be similar to the Wifatch malware in that it appears to attempt to secure devices.{{cite web | url=https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=d7cadaf3-4bd7-440c-a6e7-a2ea386b0670&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments | title=Hajime worm battles Mirai for control of the Internet of Things | publisher=Symantec | date=18 April 2017 | access-date=13 October 2017 | author=Grange, Waylon}}
Hajime is also far more advanced than Mirai, according to various researchers.{{cite web | url=http://securityaffairs.co/wordpress/58151/malware/hajime-iot-malware.html | title=Symantec is monitoring the Hajime IoT malware, is it the work of vigilante hacker? | publisher=securityaffairs.co | date=April 20, 2017 | accessdate=13 October 2017 | author=Paganini, Pierluigi}}
The top countries infected by the malware were Iran, Brazil, Vietnam, Russia and Turkey, followed by India, Pakistan, Italy and Taiwan.{{cite web |title=300,000 obeying devices: Hajime is conquering the Internet of Things world |url=https://www.kaspersky.com/about/press-releases/2017_300000-obeying-devices-hajime-is-conquering-the-internet-of-things-world |website=kaspersky.com |language=en |date=26 May 2021}}
Malware
Hajime is a worm according to sources which have placed research on the subject.{{cite web |url= http://news.softpedia.com/news/iot-malware-hajime-fights-against-mirai-tries-to-secure-devices-515037.shtml |title= IoT Malware Hajime Fights Against Mirai, Tries to Secure Devices |publisher= Softpedia |date= April 21, 2017 |accessdate= 13 October 2017 |author= Vatu, Gabriela}}
It appears to have been discovered as early as October 2016.{{cite web |url= http://news.softpedia.com/news/vigilante-iot-worm-hajime-infects-300-000-devices-515233.shtml |title= Vigilante IoT Worm Hajime Infects 300,000 Devices |publisher= Softpedia |date= April 27, 2017 |accessdate= 13 October 2017 |author= Vatu, Gabriela}}
Later in April 2017, Hajime generated large media coverage as it appeared to be in competition with Mirai.{{cite web |url= https://threatpost.com/mirai-and-hajime-locked-into-iot-botnet-battle/125112/ |title= Mirai and Hajime Locked Into IoT Botnet Battle |publisher= threatpost |date= April 21, 2017 |accessdate= 13 October 2017 |author= Spring, Tom}}
This led to a number of reports which compared and noted that it appeared to have a similar purpose to Linux.Wifatch.{{cite web |url= https://www.bleepingcomputer.com/news/security/vigilante-hacker-uses-hajime-malware-to-wrestle-with-mirai-botnets/ |title= Vigilante Hacker Uses Hajime Malware to Wrestle with Mirai Botnets |publisher= Bleeping Computer |date= April 19, 2017 |accessdate= 13 October 2017 |author= Cimpanu, Catalin}}
It also did not contain any modules or tools for denial of service attacks, but instead only contained methods for extending its reach.{{cite web |url= https://www.scmagazineuk.com/hajime-malware-now-has-300000-strong-botnet-at-disposal-say-researchers/article/653516/ |title= Hajime malware now has 300,000 strong botnet at disposal say researchers |publisher= scmagazineuk.com |date= April 28, 2017 |accessdate= 13 October 2017 |author= Millman, Rene}}
Hand written assembly code specifically for several platforms was also discovered by researchers as well.{{cite web |url= https://security.rapiditynetworks.com/publications/2016-10-16/hajime.pdf |title= Hajime: Analysis of a decentralized intern et worm for IoT devices |publisher= rapiditynetworks.com |date= 16 October 2016 |accessdate= 14 October 2017 |author= Edwards, Sam |author2= Profetis, Ioannis |archive-date= 30 December 2016 |archive-url= https://web.archive.org/web/20161230182045/https://security.rapiditynetworks.com/publications/2016-10-16/hajime.pdf |url-status= dead }}
Hajime is similar to Mirai in its method of how it manages to compromise systems.{{cite web |url= http://www.securityweek.com/white-hat-hacker-created-mysterious-iot-worm-symantec-says |title= White Hat Hacker Created Mysterious IoT Worm, Symantec Says |publisher= securityweek.com |date= April 20, 2017 |accessdate= 14 October 2017 |author= Arghire, Ionut}}
One of the key differences with Mirai is that it uses a peer-to-peer network for communications.{{cite web |url= https://thehackernews.com/2017/04/vigilante-hacker-iot-botnet_26.html |title= Hajime 'Vigilante Botnet' Growing Rapidly; Hijacks 300,000 IoT Devices Worldwide |publisher= thehackernews.com |date= April 26, 2017 |accessdate= 14 October 2017 |author= Khandelwal, Swati}}{{cite news |title=Hajime, the mysterious evolving botnet |url=https://securelist.com/hajime-the-mysterious-evolving-botnet/78160/ |work=securelist.com |date=25 April 2017}}
What was also noted was the message the malware left on systems it compromised.{{cite web |url= https://security.radware.com/ddos-threats-attacks/hajime-iot-botnet/ | title=Hajime Botnet – Friend or Foe? |publisher= radware.com |date= 26 April 2017 |accessdate= 14 October 2017}}
The message left on systems compromised by Hajime displayed on terminals is shown below.{{cite web |url= https://thehackernews.com/2017/04/vigilante-hacker-iot-botnet.html |title= To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does |publisher= thehackernews.com |date= April 19, 2017 |accessdate= 14 October 2017 |author= Khandelwal, Swati}}
cellpadding="1" cellspacing="10" style="text-align:left; margin:10px; border:2px solid; background:#CCCCBB;"
| Just a white hat, securing some systems. |
Important messages will be signed like this! |
Hajime Author. |
Contact CLOSED Stay sharp! |
See also
- BASHLITE – another notable IoT malware
- Denial-of-service attack
- Linux malware
- Linux.Darlloz – another notable IoT malware
- Remaiten - another IoT DDoS bot
References
{{reflist|35em}}
{{IoT Malware}}
{{Hacking in the 2010s}}