Thursday, March 28, 2024

One Million Organisations hit in under a Month with a Massive IoT botnet

The Internet of Things or IoT refers to the vast network of connected devices or “things” connected to the Internet which can be used to exchange and collect data. IoT devices include anything smartphones, smart appliances, healthcare devices, traffic monitoring cameras etc.

Much like anything these days, even IoT can come under attack by those who know how to harness its potential for malice. So it perhaps didn’t come as any big surprise that back in October 2016, Mirai (Japanese for “the future”), a malware surfaced attacking IoT devices such as IP cameras and home routers turning them into “bots”.

The hackers then used the IoT botnet to launch a catastrophic DDOS attack on a popular security blog called KrebsOnSecurity. The attack at that time was one of the largest recorded DDOS attacks in the Internet history (620GBps in size). The source code for Mirai written in C was then later released on GitHub.

But last Friday, a new botnet called Reaper or IoT Troop surfaced and has already affected at least a million networks and is considered more dangerous than the Mirai.

Its only up to one’s worse imagination that if Miraii could launch a DDOS attack of close to 620GBps in size, what Reaper could do with a million networks already as part of its botnet.

Researchers at Checkpoint claim using propagation attack where instead of sending a malicious code to every device, the hackers behind Reaper are using the compromised devices to spread the code to other devices.

Checkpoint estimates millions of organizations affected worldwide including US and Australia and the numbers increasing.Attacks found originating from different devices, countries and 60% from corporate networks according to ThreatCloud network.

As with any new technology, IoT promises to be the future of the Internet, bringing better connectivity and ease of use of the devices we use, but as these two botnet attacks show, an equal amount of stress must be placed on security.

Website

Latest articles

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles