{"id":13134,"date":"2021-05-21T08:06:00","date_gmt":"2021-05-21T08:06:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=13134"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"analysis-of-the-sbidiot-iot-malware","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/analysis-of-the-sbidiot-iot-malware\/","title":{"rendered":"Analysis of the SBIDIOT IoT Malware"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><strong>Produced by: Yuchen PAN<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial of service (DDoS) attacks. So far, very few incidents of this malware have been discovered by VirusTotal and cybersecurity communities. Though some IoT botnets focus on cryptocurrency mining or fraud activities, SBIDIOT-related botnets are interested only in launching DDoS attacks.<\/p>\n\n\n\n<p>In this document, we will reveal how SBIDIOT communicates with targets and what commands this malware uses, informing threat detection to help prevent threats before they actually occur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Analysis of SBIDIOT Malware<\/h2>\n\n\n\n<p>The SBIDIOT malware propagates by exploiting vulnerabilities in obsolete firmware used by IoT devices. It seems that easy targets are ZTE routers using old firmware versions that susceptible to remote code execution. On infected devices, we observe that shell scripts, once sent to the victim devices in various way, will be downloaded to execute the binary payload.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/1-1024x671.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13137\" width=\"495\" height=\"324\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/1-1024x671.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/1-300x197.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/1-768x503.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/1.png 1218w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/figure>\n\n\n\n<p>The sample e2b3ca0a97107fa351e39111c80b3fef&acirc;&euro;&brvbar;&acirc;&euro;&brvbar;41eabe845af4b9 is packed with the standard UPX tool, with the UPX header later modified. Though the malware is still executable, it is no longer likely to unpack with the same tool:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/2-1024x605.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13139\" width=\"486\" height=\"287\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/2-1024x605.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/2-300x177.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/2-768x453.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/2.png 1289w\" sizes=\"(max-width: 486px) 100vw, 486px\" \/><\/figure>\n\n\n\n<p>As shown in the following figure, the UPX! Signature is replaced by a custom YTS\\x99 signature:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/3-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13141\" width=\"484\" height=\"325\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/3-1.jpg 860w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/3-1-300x201.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/3-1-768x515.jpg 768w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/figure>\n\n\n\n<p>Therefore, we can unpack the sample with the standard UPX tool after restoring this signature.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/4-1024x638.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13143\" width=\"501\" height=\"312\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/4-1024x638.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/4-300x187.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/4-768x479.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/4.png 1295w\" sizes=\"(max-width: 501px) 100vw, 501px\" \/><\/figure>\n\n\n\n<p>During the analysis, we find that signatures are very common for this type of threat. Also, it&#8217;s noteworthy that some DDoS codes are shared with other malware families like Gafgyt.<\/p>\n\n\n\n<p>Given that the sample is statically linked and stripped, which is almost always true for IoT-targeting malware, the next step is to load FLIRT signatures for uClibc to make analysis easier. uClibc is a compact C library commonly used in Linux kernel-based embedded devices. IoT malware developers often use this library for easy cross-compilation. In essence, FLIRT signatures are a method used by reverse engineering tools like IDA to pattern-match known libraries, significantly speeding up the analysis process.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/5-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13145\" width=\"236\" height=\"597\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/5-2.jpg 384w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/5-2-119x300.jpg 119w\" sizes=\"(max-width: 236px) 100vw, 236px\" \/><\/figure>\n\n\n\n<p>FLIRT can recognize a great many of functions.<\/p>\n\n\n\n<p>Upon execution, the sample attempts to connect to its C2. In this case, C2 is an IP address and port hard-coded into the binary. Though the C2 server was not operational during analysis, we can force the sample to communicate with our own server as its C2. This, combined with some static analysis, was enough for interaction simulation.<\/p>\n\n\n\n<p>In the sample, the function for handling commands compares each command received from C2 with one of the following strings. In other words, this sample can execute 16 commands received from C2.<\/p>\n\n\n\n<p class=\"has-background has-very-light-gray-background-color\">TCP, HTTPSTOMP, VSE, HEX, STD, VOX, NFO, UDP, UDPH, R6, FN, OVHKILL, NFOKILL, STOP, Stop, stop<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Commands Supported by SBIDIOT<\/h2>\n\n\n\n<p><strong>TCP<\/strong><\/p>\n\n\n\n<p>The TCP command instructs the bot to send TCP segments to a specified host\/port combination during a specified interval. Besides, it allows the operator to set some optional TCP flags.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/6-1-986x1024.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13147\" width=\"426\" height=\"442\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/6-1-986x1024.jpg 986w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/6-1-289x300.jpg 289w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/6-1-768x798.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/6-1.jpg 988w\" sizes=\"(max-width: 426px) 100vw, 426px\" \/><\/figure>\n\n\n\n<p>The above figure shows custom TCP flags allowed in the TCP command handler.<\/p>\n\n\n\n<p><strong>HTTPSTOMP<\/strong><\/p>\n\n\n\n<p>This command contains arguments like an HTTP method, a host\/port combination, an attack duration, and a request count that specifies how many times to repeat this operation. If the attack duration and the request count are not exceeded, this function will continue to perform HTTP requests by using the provided settings and a randomly selected user-agent string.<\/p>\n\n\n\n<p>Following is a hard-coded list of user-agent strings:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/7-1024x253.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13149\" width=\"481\" height=\"119\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/7-1024x253.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/7-300x74.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/7-768x190.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/7-1536x380.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/7-2048x507.jpg 2048w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/figure>\n\n\n\n<p>HTTPSTOMP command handler:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/8-1024x863.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13151\" width=\"478\" height=\"402\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/8-1024x863.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/8-300x253.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/8-768x647.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/8.jpg 1218w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/><\/figure>\n\n\n\n<p>In addition, another function is invoked to initiate HTTP requests to the \/cdn-cgi\/l\/chk_captcha URI of a hostname\/port combination with, once again, a configurable attack duration and request count. This way, it can circumvent CloudFlare protection mechanisms.<\/p>\n\n\n\n<p><strong>VSE<\/strong><\/p>\n\n\n\n<p>VSE is another command used for DDoS. Depending on the arguments provided, it uses either UDP or RAW sockets. Again, arguments for the target and attack duration can be provided. Also, the attacker can specify an interval between packets delivered to the target. Once in a while, variants of Gafgyt and other IoT malware will use a VSE command to target servers running the Valve Source Engine.<\/p>\n\n\n\n<p>The following figure shows a code snippet from VSE command handler implementing the interval.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13153\" width=\"441\" height=\"335\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/9.jpg 880w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/9-300x228.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/9-768x583.jpg 768w\" sizes=\"(max-width: 441px) 100vw, 441px\" \/><\/figure>\n\n\n\n<p><strong>VOX<\/strong><\/p>\n\n\n\n<p>The VOX command uses a host, a port, and an attack duration as its arguments and then sends UDP datagrams that contain one of three randomly selected hard-coded payloads.<\/p>\n\n\n\n<p>The following figure shows malicious UDP traffic containing hardcoded payloads.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13155\" width=\"359\" height=\"351\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/10.jpg 1000w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/10-300x294.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/10-768x753.jpg 768w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/><\/figure>\n\n\n\n<p><strong>UDP<\/strong><\/p>\n\n\n\n<p>The sample sends UDP payloads to a target host specifying the port, attack duration, and maximum size of the generated payload. The actual size of the payload may be smaller as the strlen function is used to calculate the size by counting bytes up from a memory location (start of a string, a middle location, or an unspecified memory area) until the first null value, and return the size value.<\/p>\n\n\n\n<p>The following are part of codes validating UDP arguments:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/11.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13157\" width=\"431\" height=\"292\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/11.jpg 896w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/11-300x204.jpg 300w\" sizes=\"(max-width: 431px) 100vw, 431px\" \/><\/figure>\n\n\n\n<p><strong>HEX \/ STD \/ R6 \/ NFO \/ FN \/ OVHKILL \/ NFOKILL \/ UDPH<\/strong><\/p>\n\n\n\n<p>All of the preceding commands invoke the same function that receives a host name, a port, and an attack duration, then starts generating UDP traffic featuring a fixed payload.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"443\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/12.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13159\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/12.jpg 1000w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/12-300x133.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/12-768x340.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p><strong>STOP\/stop\/Stop<\/strong><\/p>\n\n\n\n<p>This command sends a SIGKILL signal to all process IDs that are currently being tracked, allowing operator to stop the process&#8217;s any child processes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/13.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13161\" width=\"478\" height=\"148\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/13.jpg 894w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/13-300x93.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/13-768x237.jpg 768w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Relevant C2 Servers<\/strong><\/h2>\n\n\n\n<p>In 2021, 33 C2 IP addresses are discovered around the globe, mainly in the USA and some European cities. The following figure shows the global distribution of these IP addresses.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/14-1024x651.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-13163\" width=\"449\" height=\"285\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/14-1024x651.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/14-300x191.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/14-768x488.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/14.jpg 1154w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/figure>\n\n\n\n<p>Following are commonly used file names:<\/p>\n\n\n\n<p>sh (located in the root directory, unlike those instances in the SBIDIOT subdirectory)<br>sh4<br>sp<br>root<br>rtk<br>zte<br>yarn<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sum-up<\/h2>\n\n\n\n<p>The sharp surge in IoT devices connecting to the Internet is accompanied by constantly emerging new malware families and variants of existing malware. These malware, no matter how complicated they are, can pose threats.<\/p>\n\n\n\n<p>Users are strongly advised to take the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Change the default password during the first use of IoT devices.<\/li><li>Regularly check firmware versions and apply updates in time.&nbsp;<\/li><li>Do not open ports to the Internet unless necessary.<\/li><li>Deploy detection and protection devices in mission-critical environments.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Reference Links:<\/h2>\n\n\n\n<p><a href=\"https:\/\/gist.github.com\/techhelplist\/93b84256d2608f344217f3582c03de94\">https:\/\/gist.github.com\/techhelplist\/93b84256d2608f344217f3582c03de94<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-security-boulevard\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/securityboulevard.com\/2021\/04\/threat-intelligence-analysis-of-the-sbidiot-iot-malware\/\n<\/div><\/figure>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Produced by: Yuchen PAN Introduction Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial of service (DDoS) attacks. So far, very few incidents of this malware have been discovered by VirusTotal and cybersecurity communities. Though some IoT botnets focus on cryptocurrency mining or fraud activities, SBIDIOT-related botnets [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8988,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5],"tags":[506],"class_list":["post-13134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysis of the SBIDIOT IoT Malware - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis of the SBIDIOT IoT Malware - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Produced by: Yuchen PAN Introduction Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-21T08:06:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Analysis of the SBIDIOT IoT Malware - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Produced by: Yuchen PAN Introduction Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Analysis of the SBIDIOT IoT Malware\",\"datePublished\":\"2021-05-21T08:06:00+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/\"},\"wordCount\":1038,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/AdobeStock_105957285.jpg\",\"keywords\":[\"malware\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/\",\"name\":\"Analysis of the SBIDIOT IoT Malware - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/AdobeStock_105957285.jpg\",\"datePublished\":\"2021-05-21T08:06:00+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/AdobeStock_105957285.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/AdobeStock_105957285.jpg\",\"width\":500,\"height\":375,\"caption\":\"DDOS Attack text on brick wall background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-the-sbidiot-iot-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analysis of the SBIDIOT IoT Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of the SBIDIOT IoT Malware - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/","og_locale":"pt_BR","og_type":"article","og_title":"Analysis of the SBIDIOT IoT Malware - NSFOCUS","og_description":"Produced by: Yuchen PAN Introduction Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial","og_url":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/","og_site_name":"NSFOCUS","article_published_time":"2021-05-21T08:06:00+00:00","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Analysis of the SBIDIOT IoT Malware - NSFOCUS","twitter_description":"Produced by: Yuchen PAN Introduction Recently, an IoT malware sample dubbed SBIDIOT is found to engage in malicious activities, mainly distributed denial","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Analysis of the SBIDIOT IoT Malware","datePublished":"2021-05-21T08:06:00+00:00","dateModified":"2026-04-17T18:07:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/"},"wordCount":1038,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg","keywords":["malware"],"articleSection":["Blog","DDoS Mitigation"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/","url":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/","name":"Analysis of the SBIDIOT IoT Malware - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg","datePublished":"2021-05-21T08:06:00+00:00","dateModified":"2026-04-17T18:07:46+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/07\/AdobeStock_105957285.jpg","width":500,"height":375,"caption":"DDOS Attack text on brick wall background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/analysis-of-the-sbidiot-iot-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Analysis of the SBIDIOT IoT Malware"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/13134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=13134"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/13134\/revisions"}],"predecessor-version":[{"id":32676,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/13134\/revisions\/32676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8988"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=13134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=13134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=13134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}