Categories: DDOS

One Million Organisations hit in under a Month with a Massive IoT botnet

The Internet of Things or IoT refers to the vast network of connected devices or “things” connected to the Internet which can be used to exchange and collect data. IoT devices include anything smartphones, smart appliances, healthcare devices, traffic monitoring cameras etc.

Much like anything these days, even IoT can come under attack by those who know how to harness its potential for malice. So it perhaps didn’t come as any big surprise that back in October 2016, Mirai (Japanese for “the future”), a malware surfaced attacking IoT devices such as IP cameras and home routers turning them into “bots”.

The hackers then used the IoT botnet to launch a catastrophic DDOS attack on a popular security blog called KrebsOnSecurity. The attack at that time was one of the largest recorded DDOS attacks in the Internet history (620GBps in size). The source code for Mirai written in C was then later released on GitHub.

But last Friday, a new botnet called Reaper or IoT Troop surfaced and has already affected at least a million networks and is considered more dangerous than the Mirai.

Its only up to one’s worse imagination that if Miraii could launch a DDOS attack of close to 620GBps in size, what Reaper could do with a million networks already as part of its botnet.

Researchers at Checkpoint claim using propagation attack where instead of sending a malicious code to every device, the hackers behind Reaper are using the compromised devices to spread the code to other devices.

Checkpoint estimates millions of organizations affected worldwide including US and Australia and the numbers increasing.Attacks found originating from different devices, countries and 60% from corporate networks according to ThreatCloud network.

As with any new technology, IoT promises to be the future of the Internet, bringing better connectivity and ease of use of the devices we use, but as these two botnet attacks show, an equal amount of stress must be placed on security.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

15 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

16 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

18 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

22 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

23 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

23 hours ago