Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Facebook Fanpage
Twitter Feed
618 Following
Google Intends To Ban Third Party Cookies, Promise To Not Keep Tracking You #cookies https://t.co/BefsufGq8c https://t.co/MDYMnoIgSq
Android Users Can Now Access Spaces, Twitter's Audio Chat Rooms #spaces #Twitter https://t.co/YkA4wrWtft https://t.co/cisKKBg1Gd
How To Merge Chrome's Built-in Password Manager With Third-Party Password Managers #Chrome #passwordshttps://t.co/MJyxGxm1re
Microsoft Teams Integrates With PowerPoint To Bolster Its Tweaked Presenter Mode #MicrosoftTeamshttps://t.co/RbNvSY9MVX
Browse By Categories

Friday DDoS Update: We Know How It Happened But Not Who Did It Plus IoT Security In View


Last week started well and ended with a shocker on Friday that has got the tech world still talking. Around 7:10AM ET/12 Noon Nigerian, Dyn was a target of a DDoS attack which in turn affected sited like Twitter, Netflix, Amazon, Spotify, PayPal etc. in some parts of the United States.

As you might expect, the blame game started to pour in and the two big questions at the time were;

  • How did this happen and
  • Who’s responsible?

Right now, we may know how it happened but it’s still not clear who’s behind it as the United States government is now investigating.  

How it happened

The attacks were carried out using criminal botnets that were infected with Mirai; a type of malware that can used to take over the internet-of-things (IoT) as we know it. The IoTs are connected devices that range from your light bulb to wearables and the moment a bad actor is able to crack your password on these devices, they are able to do just about anything.

In the case of what happened on Friday though, DVRs and cameras were used. In fact Hangzhou Xiongmai Technology which is a Chinese company that make such devices confirmed that some of its products played a role in the attacks. The hackers were able to get on these devices after they were able to crack some weak passwords which helped them to infect these devices with the Mirai malware. They have since asked users of their DVRs and cameras to change their passwords.

Mirai continuously scans the internet for Internet of things (IoT) devices and infects them by using a table of common factory default usernames and passwords to log into them. This malware’s source code exists on the dark web (the other side of the internet that’s used to do all kinds of stuff including illegal) and security experts had always known that this day would come but at this point it looks like some bad guys out there can strike at any time again.

While investigations are on by the American government, the first step to take to protect yourself is to change those weak passwords and probably change them constantly. But companies (manufacturers and network providers) are going to have to come up with ways to make these devices more secure.

I hate to the bearer of bad news but it looks like these guys could strike soon again.

Previous Post

Apple Has A Hidden And Much Smaller iOS Keyboard That It Didn’t Want You To Know About

Next Post

The Hidden Costs of Launching a Startup

Related Posts

Subscribe Our Newsletter


Never miss an important Tech news again

HTML Snippets Powered By : XYZScripts.com