Typical IoT Ecosystem
IoT Common Vulnerabilities
Attacks on Voice Assistants
Mirai
Why is Mirai possible?
Mirai: Defense Mechanisms: Mitigation
Mirai: Defense Mechanisms: Detection
Mirai: Defense Mechanisms: Recovery
Mirai process
1) Scan
2) Report IP + credentials to Listener Server
3) Listener Server adds new device with Loader Server
4) Load (Infect)
5) Recruited (Infect)
6) Send command to C&C server
7) Dispatch (Versende) command
8) Attack