Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries

Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos H. Gañán

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

45 Downloads (Pure)

Abstract

For years, attackers have exploited vulnerabilities in Internet of Things (IoT) devices. Previous research has examined target selection in cybercrime, but there has been little investigation into the factors that influence target selection in attacks on IoT. This study aims to better understand how attackers choose their targets by analyzing the frequency of specific exploits in 11,893 IoT malware binaries that were distributed between 2018-2021. Our findings indicate that 78% of these binary files did not specifically target IoT vulnerabilities but rather scanned the Internet for devices with weak authentication. To understand the usage of exploits in the remaining 2,629 binaries, we develop a theoretical model from relevant literature to examine the impact of four latent variables, i.e. exposure, vulnerability, exploitability, and patchability. We collect indicators to measure these variables and find that they can explain to a significant extent (?2=0.38) why some vulnerabilities are more frequently exploited than others. The severity of vulnerabilities does not significantly increase the frequency with which they are targeted, while the presence of Proof-of-Concept exploit code does increase it. We also observe that the availability of a patch reduces the frequency of being targeted, yet that more complex patches are associated with higher frequency. In terms of exposure, more widespread device models are more likely to be targeted by exploits. We end with recommendations to disincentivize attackers from targeting vulnerabilities.
Original languageEnglish
Title of host publicationProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023
PublisherAssociation for Computing Machinery (ACM)
Pages513-526
Number of pages14
ISBN (Electronic)9798400707650
DOIs
Publication statusPublished - 2023
Event26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023 - Hong Kong, China
Duration: 16 Oct 202318 Oct 2023

Publication series

NameACM International Conference Proceeding Series

Conference

Conference26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023
Country/TerritoryChina
CityHong Kong
Period16/10/2318/10/23

Keywords

  • Dynamic Analysis
  • Exploits
  • Exposure
  • IoT malware
  • Vulnerabilities

Fingerprint

Dive into the research topics of 'Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries'. Together they form a unique fingerprint.

Cite this