Hackers use more than 400,000 units of Things equipment for cyber attacks

US security firm Imperva representation , from March to April this year, the company found a massive botnet attacks, mainly for online streaming media applications. According to reports, the attack uses more than 40 million units connected devices in 13 days.

The botnets and related distributed denial of service attack (DDoS attack) first appeared in 2016, similar to the botnet Mirai. For example, it could use some malware has infected Mirai open ports. However, Imperva researchers have not yet determined whether the attack Mirai malicious software, or any variant, and still do not know the intention of the attacker. "This is the largest ever Imperva Layer 7 DDoS attacks," the researchers noted in a blog Vitaly Simonovich.

Experts said the botnet attacks usually begins destruction of network equipment. Once the malicious software is built into these devices, hackers can control these devices and begin to network attacks. Since the network can not distinguish between malicious and legitimate traffic, attackers can hide their true purpose in some way. The application is extremely malicious traffic damage. Generally, the more botnet zombie, the higher the intensity of DDoS attacks. "If you have a DDoS protection solution, you need to check to make sure mitigation solutions that can handle this scale attack," Simonovich said. "Attacker's ability to continue to improve, becoming more complex, and therefore, should not be overlooked mitigation solutions."

It is understood that, since 2016, many new things vendors have entered the market. But very few people learn from past mistakes safety. Many design things device still does not take into account security. The researchers found that early this year, nearly two million of Things equipment defects in the built-in software, and very vulnerable. These devices include security cameras, baby monitors, and intelligent doorbell.

Guess you like

Origin www.linuxidc.com/Linux/2019-08/159723.htm