HomeNews唉! New Kaiji Malware Attacks IoT devices using SSH Brute Force

唉! New Kaiji Malware Attacks IoT devices using SSH Brute Force

If you purchase via links on our reader-supported site, we may receive affiliate commissions.
cyberghost vpn ad

The Kaiji malware was designed by a developer based in China to launch DDoS attacks according to researchers.

The Internet of Things (IoT) has revolutionized the way we interact with the digital world. From smart refrigerators to connected thermostats, these devices offer convenience and automation.

However, with this growing network of interconnected devices comes a new layer of vulnerability: malware specifically designed to target them.

Enter Kaiji Malware: A New Player in the DDoS Game

In 2020, security researchers stumbled upon a new strain of malware dubbed “Kaiji.” Named after a character in a Japanese manga series, Kaiji was unlike other IoT malware encountered before. Here's what makes it stand out:

  • Developed for Disruption: Researchers believe Kaiji was designed by a developer based in China primarily to launch distributed denial-of-service (DDoS) attacks. These attacks overwhelm targeted servers with a flood of traffic, rendering them inaccessible to legitimate users.

  • Targeting the Vulnerable: Kaiji primarily spreads through SSH brute-force attacks. This involves systematically trying different usernames and password combinations to gain unauthorized access to vulnerable servers. It specifically targets the “root” user account, granting it complete control of the system if successful.

  • Built for Persistence: Once Kaiji gains access, it utilizes a bash script to establish a foothold on the infected system. This script creates a space for the malicious code to operate and ensures its continued presence even after a system reboot.

  • A Language Shift: Most IoT malware is written in familiar languages like C or C++. However, Kaiji deviates from the norm, being built from scratch using the Go programming language (Golang). This choice offers advantages like portability and ease of development, potentially signalling a growing trend among malware creators.

  • DDoS Arsenal: Kaiji boasts a repertoire of DDoS attack techniques. These include SYN floods, IP spoofing (making it appear as if the attack originates from a different source), and an SSH brute-force module to propagate the infection further. Additionally, it can exploit unpatched vulnerabilities in targeted systems, expanding its reach.

  • A Work in Progress: While capable of launching diverse attacks, Kaiji lacks the sophistication of some established botnets. Researchers believe it's still under development, lacking complex functionalities found in its counterparts.

Protecting Yourself from Kaiji and Beyond

The emergence of Kaiji highlights the ever-evolving threat landscape targeting IoT devices. Here are some crucial steps you can take to safeguard your devices:

  • Secure Your SSH Access: If you use SSH on your devices, ensure you have strong, unique passwords and enable two-factor authentication whenever possible. Turning off password-based authentication and relying on key-based access further strengthens security.

  • Keep Software Updated: Patching software vulnerabilities promptly is vital. Many attacks exploit known flaws in outdated Software. Configure your devices to receive automatic updates whenever possible.

  • Employ Strong Passwords: Weak passwords are easy targets for brute-force attacks. Implement strong, unique passwords for all your devices and online accounts. Consider using a password manager to generate and manage complex passwords.

  • Invest in Reputable Security Software: A robust antivirus and anti-malware program can offer an additional layer of protection against various threats, including malware like Kaiji.

  • Stay Informed: Keeping yourself updated on the latest security threats and vulnerabilities allows you to protect your devices proactively. Look for reliable security resources and stay vigilant.

By following these steps, you can significantly reduce the risk of your devices falling prey to Kaiji malware and other emerging threats. Remember, securing your IoT ecosystem is a continuous process.

By prioritizing security practices and staying informed, you can create a more secure and resilient connected environment for your devices.

To protect your digital devices from malware, you should make use of a strong antivirus program.

CHECK OUT: Antivirus Special Offers & Deals

Note: This was initially published in May 2020 but has been updated for freshness and accuracy.


About the Author:

Writer at SecureBlitz | Website | + posts

Amaya Paucek is a professional with an MBA and practical experience in SEO and digital marketing. She is based in Philippines and specializes in helping businesses achieve their goals using her digital marketing skills. She is a keen observer of the ever-evolving digital landscape and looks forward to making a mark in the digital space.


Delete Me
Incogni Black Friday Ad
Heimdal Security ad


Please enter your comment!
Please enter your name here