Connect with us
Masjesu botnet

Internet of Things

Botnet Threatens Smart Factories with Extortion Attacks

Botnet Threatens Smart Factories with Extortion Attacks

A newly identified botnet is actively targeting unsecured industrial internet of things (IIoT) devices on smart factory floors, leading to extortion attempts and significant operational disruption. Security researchers report that the malware, dubbed “Masjesu,” exploits vulnerabilities in common industrial hardware to create networks of compromised devices. These networks are then used to launch attacks that can halt production, with attackers demanding payment to restore normal operations.

The threat highlights a critical vulnerability within modern manufacturing environments. As factories become more connected, they integrate millions of smart sensors, programmable logic controllers, connected actuators, and IP cameras into their operational technology (OT) networks. This shift towards smart manufacturing, while increasing efficiency, dramatically expands the potential attack surface for cybercriminals.

How the Botnet Operates

The Masjesu botnet specifically scans for industrial IoT devices that have not received recent security patches or that use default login credentials. Once it gains access, the malware installs itself on the device, turning it into a node within a larger botnet army. This army can include a wide range of routing hardware and industrial edge gateways, which are essential for funneling operational telemetry data back to central servers.

These compromised devices are then used as launchpads for distributed denial-of-service (DDoS) attacks against the factory’s own internal network. The primary goal is to overwhelm critical systems, causing severe operational downtime on the production floor. Following the disruption, the attackers typically issue a ransom demand, threatening continued attacks unless a payment is made.

The Risk to Operational Technology

The convergence of information technology (IT) and operational technology (OT) networks, while beneficial for data analytics and process optimization, has created new security challenges. OT environments, which directly control physical machinery, were traditionally isolated from external networks. Their increasing connectivity to corporate IT systems and the internet exposes them to threats previously confined to the digital world.

Security experts note that many IIoT devices were designed with a focus on reliability and longevity, not cybersecurity. They often run on outdated operating systems, lack robust authentication mechanisms, and cannot be easily patched without risking production stoppages. This makes them attractive and relatively easy targets for botnet herders.

Industry and Security Response

Cybersecurity firms monitoring the threat advise manufacturers to immediately inventory all connected devices on their factory floors. Recommended actions include segmenting OT networks from general corporate IT networks, changing all default passwords, and implementing a rigorous patch management schedule for all IIoT components, where feasible.

National cybersecurity agencies in several industrialized nations have issued alerts regarding the rising trend of extortion-based attacks against critical infrastructure, including manufacturing. They emphasize that paying ransoms does not guarantee the restoration of services and may encourage further attacks.

Looking Ahead

The emergence of the Masjesu botnet is expected to accelerate existing efforts to establish stronger security standards for industrial control systems. Industry groups and standards bodies are likely to push for the adoption of security-by-design principles in new IIoT hardware. In the near term, manufacturers worldwide are anticipated to increase audits of their smart factory infrastructure and invest in specialized OT security monitoring tools to detect similar intrusions before they can cause costly production halts.

Source: IoT Tech News

More in Internet of Things