IoT

Mirai is Attacking Again, So We’re Outing its Hilarious, Explicit C&C Hostnames

With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their denylists and protect themselves.
January 04, 2018
5 min. read

Warning: Explicit and potentially offensive content ahead.

The Mirai botnet is kind of like Madonna. They both were huge once, and then the adoring public shifted their attention to younger, newer acts but they keep on performing anyway. We wrote about Mirai extensively after we predicted its construction in our first IoT report, DDoS’s Newest Minions: IoT Devices in 2016.

Mirai has been in the news again recently. In December, Brian Krebs reported1 that two men had pleaded guilty as the co-authors of the IoT botnet. A new botnet, Satori (Japanese for “the awakening”) is a possible successor to Mirai. The source code for Satori was recently posted to Pastebin2 as a Christmas gift to the IoT hacker community. Like Reaper, Satori weaponizes exploits beyond simple brute-force default password guessing.3

F5 Labs and our data partner, Loryka, still monitor Mirai (but not Madonna, ha ha). Because even though Satori and Reaper might be the interesting new acts, Mirai and its children are still actively attacking from the Internet of Things. Our honeypots grab configurations from each botnet and we compile the list of command and control (C&C, a.k.a. C2 or CNC) hostnames that are used to control each bot. Attacks from the C&C host themselves are rare, but they make good indicators of compromise (IOC) because any requests for those hosts from inside a protected network can be traced back to the infected devices themselves.

So, we were looking through last quarter’s list of Mirai spinoff bots and all of their command and control (C&C) hostnames and had a bit of a laugh. Of course, we take this botnet stuff seriously, but we couldn’t help snickering a little at some of the domain names.

Of the 203 C&C hostnames we sampled in the last quarter of 2017, about 70 are still active in DNS. And of that original 203, 71% were registered (and almost certainly hosted) by Freenom, Namecheap (an Enom reseller), or Cloudflare. If you were a cybercriminal, why not use “free” domain registration services like Freenom for your C&C hosts? A simple Google search will tell you they care little about what you do with the domain as long as you use it (or they will eagerly park your domain and start collecting ad revenue). When it comes to domain registrars like Enom that offer reseller services to companies like Namecheap, the layers of domain management and orchestration from the registrant to the controller can make it harder to track down and process abuse complaints. Because cyber criminals know this, they often favor resellers instead of direct registrars. A simple Google search for Namecheap will turn up a history of complaints alleging they do little about abuse complaints, so it’s not surprising cyber criminals would chose to use them. Cloudflare, on the other hand, has drawn fire from Brian Krebs4 for their continued hosting of obvious DDoS-for-hire services.

 

 

Sure, the C&C list is a small sample size, and C&C hosts come and go quickly. This list is in no way exhaustive—it’s just a snapshot in time from last quarter. But for a breakdown of the domain hosting services, see the end of this article.

“Yes, I really am a C&C server.”

A disturbing number of the C&C servers brazenly scream out that they are, indeed, nefarious “cnc” servers. Check out this subset:

cnc.bigbandsinmyvault.tk
cnc.bigbotpein.ru
cncbot.cnbot.space
cncbot.ddns.net
cnc.changeme.com
cnc.linux.lol
cnc.nutsz.club
cnc.skidsec.org
cnc.spamtech.win

There’s a whole other category of hosts that identify not just as C&C servers, but as Mirai C&C servers. Thanks for the specificity, dudes! How much more obvious do you need to be?

cmdmirai.tk
cnc.mirai.com
iotmirai.tk
lolzsecssh*ttymirai.tk
miraibotnet.ml
miraibotnet.online
miraihoneypot.tk
mirainet.ml
mirainet.tk

For those of you security engineers out there, it’s probably not a terrible idea to flag any computer in your network that is looking up hosts that begin with “cnc” or “mirai.”

And somebody really likes boats. We like boats, too.

bigboats.club
bigboatz.us
boatnet.xyz
boat.racoon.ml
gammaboat.us
ssh.gammaboat.us
www.trapboat.club

We’ve been saying that the Internet of Things is the attacker platform of the future. The world of IoT botnets is highly automated. And, of course, our defenses are getting more automated, as well. It’s computers attacking and computers defending.

But every now and then you get a glimpse of the humanity buried in the morass of digital data. Like when you run across C&C hostnames that contain absurdly juvenile names and words you haven't heard since middle school. But that’s how you know they’re human. And humans make mistakes. Sometimes those mistakes are other humans, and those humans end up building IoT botnets controlled by C&C hosts whose names offend the senses or offer dubious advice.

What’s Up With All the .tk Domains?

In theory, the .tk top level domain (TLD) represents the Tokelau island chain of New Zealand, a place so small it doesn’t even have a regional airport. In reality, .tk domains are free and are used by the poor as well as a huge number of spammers, phishers, and stressors.5The .tk TLD is now, incredibly, the third most popular after .com and .net. That’s right, more popular than .uk, .org, and .sex.

The massive popularity of .tk domains has increased the GDP of Tokelau by 10% and some of the increased revenue goes to provide the local poor their own Internet access. 6Such a strange, circular world we live in.

Conclusion

Credit goes to the infosec community as 70% of the C&C hosts (including all of them with “cnc” in the hostname) are already offline. Cloudflare is still hosting about 7 of these hosts, down from the original 14.

Below is the list of hosts in table form. The second column denotes whether or not the host appears to still be active, at least from a network perspective.

Feel free to add these hosts to threat Intelligence IP reputation lists.

 

Mirai C&C Host Active
0x01.nexusiotsolutions.net 0
0x01.preload.su 0
0x90.bid 1
1eryxnva.glibc.org 0
aced.ga 1
air.sinushost.biz 0
akuma.pw 1
alhctuyy.tk 0
asapvpns.club 1
aspectleaks.xyz 1
back.uu8889.com 0
bakiiszwart.tk 0
base.monello.tk 0
bbase.monello.tk 0
bc.nexusiotsolutions.net 0
bcnc.changeme.com 0
bfrxznyisbestie.ml 0
bfyfa.fun 0
bhromofreah.top 0
bigboats.club 1
bigboatz.us 1
bkush.ml 0
blacklister.nl7 1
bloodwars.ws 1
blueandsausesfries.us 1
bnexusiotsolutions.net 0
boat.racoon.ml 0
boatnet.xyz 1
booters.ml 0
botnet.remaiten.org 0
botnetsale.tk 0
bounty.bigbotpein.ru 0
bwww.scotsa.pw 1
c.nexusiotsolutions.net 0
ccc.snicker.ir 0
central.glibc.org 0
cmdmirai.tk 1
cn.uvgczsuidrtg.com 0
cnc.bigbandsinmyvault.tk 0
cnc.bigbotpein.ru 0
cnc.changeme.com 0
cnc.linux.lol 0
cnc.mirai.com 0
cnc.nutsz.club 0
cnc.skidsec.org 0
cnc.smokemethallday.tk 0
cnc.spamtech.win 0
cnc.teammalefic.pw 0
cnc.tonguepunchfartbox.life 0
cnc.urgay.cf 0
cnc.vdskge7as.xyz 0
cnc.voxlobid.tk 0
cnc111.ml 1
cncbot.cnbot.space 0
cncbot.ddns.net 0
conwangg.de 1
cool.kingdomplugin.nl 0
coolxr.info 1
cottoncandyloverscute.website 1
crazyclothes.store 1
d.hi8520.com 0
dankstresser.tk 1
dannyexe.xyz 1
ddosattacks.tk 0
deathlives.ddns.net 0
dns 0
dportsmirai.tk 0
dssgasrea.club 1
eccc.bulletpool.ru 0
ertwer.vdskge7as.xyz 0
fFvFVcnc.changeme.com 0
featured.cf 0
fedtraps.cf 0
frost.botnet.hackedfiles.pw 0
frxznyisbestie.ml 0
ftp.xenonbooter.xyz 0
f*cktzoh.xyz 0
fyfa.fun 1
gammaboat.us 1
Gangsters.cf 1
gndfgdd.club 1
gnikllort.com 0
gotdns.ch 1
gotnulled.ga 0
greekhelios21.tk 1
happyf33t.nl 1
hello.bigpuller.cf 0
hoaxnet.ddns.net 0
horsec*cked.4horsemen.pw 0
hotelcasa.nl 1
hromofreah.top 0
ikbensupercool.nl 1
iktufopjou.nl 1
infecteverywhere.online 1
int.aerx.io 0
internetgangster.tk 1
internetpolice.ga 1
internetpolice.ml 0
internetpolice.tk 1
iotmirai.tk 1
isalinux.intercomonline.com 0
kagbe.nl 1
kingdomplugin.nl 1
kormirai.ddns.net/ 0
kringelstan.net 1
kush.ml 1
leakedfiles.org 1
legendarysprx.pw 0
linuxsecuritys.com 1
lol.godlynet.cf 0
lol665.tk 0
lolzsecssh*ttymirai.tk 0
mail.harikatha.com 0
majikku.us 1
miraibotnet.ml 0
miraibotnet.online 1
miraihoneypot.tk 0
mirainet.ml 1
mirainet.tk 1
mm.haxornah.top 0
moanmybins.ml 1
modems.pw 1
monello.tk 1
myacerusername.hopto.org 0
mymiraiserver.hopto.org 0
mypawnshop.men 1
nageboorte.ga 1
naotogoyamamcc.asuscomm.com 0
net.nageboorte.nl 0
neuvostoliitto.ml 1
neuvostoliitto.tk 0
nexusaquariums.ir 0
nexusiotsolutions.net 1
nnn.shenron.pw 0
nullserversmirai.tk 0
offlineservers.tk 1
online.upmirai.club 0
onyxreppingoat.cf 0
panel.miraibotnet.eu 0
powa.daddyhackingteam.com 0
power4you.ddns.net 0
predoxing.tk 0
purgeblood.duckdns.org 0
puti.csgo 0
putintrump.cf 0
putintrump.tk 1
pvpcloud.us 1
pyfulthag0d.pw 1
q5f2k0evy7go2rax9m4g.ru 0
reppin.tk 0
rofl.leakvortex.pro 0
rootyi.site 1
runscape.cf 0
rw595phpt4kk538s.botanik.gq 0
s0.3eu.ru 0
santasbigcandycane.cx 1
sbnmcd.org 1
sepinsftw.tk 0
serveranywhere.cf 0
serveranywhere.ga 0
serversrus.club 1
sevenp.top 0
smithre.top 0
snicker.ir 0
ssh.gammaboat.us 0
swatnetiphone.tk 0
swatnetsucks.tk 0
swinginwithme.ru 0
swizzthegod.us 1
test.cnc 0
thebigbadbotnet.tk 1
thonder.club 0
totalbooter.us 1
truepower.club 1
unix.tk 1
upfiles.online 0
uryjsdrfg.club 0
vap3.ddns.net 0
wheresmirai.tk 0
winter.winterboot.net 0
www.ghoststresser.pw 0
www.newel.se 0
www.scotsa.pw 1
www.trapboat.club 0
yzykar.ddns.net 0
zammanaakis.link 1
zetastress.net 0
Join the Discussion
Authors & Contributors
David Holmes (Author)
Sr. Threat Research Evangelist
Footnotes

1 https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/

2 https://pastebin.com/kKQX7s3E

3 http://securityaffairs.co/wordpress/67227/malware/cve-2017-17215-exploit-code.html

4 https://krebsonsecurity.com/?s=cloudflare+booter&x=0&y=0

5 https://en.wikipedia.org/wiki/.tk

6 https://en.wikipedia.org/wiki/Tokelau#Internet_domain_names

7 F5 Labs is committed to removing racially charged language from our writing. The term "blacklist" in reference to cybersecurity is one such instance - we choose to use the term "denylist" in its place. However, in this case, the term "blacklist" is used in a specific C&C hostname. Changing or removing the term would lose important context. F5 Labs wishes to make it clear that we do not condone the usage of this term in the context of cyberecurity.

What's trending?

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read