SHARE
Facebook X Pinterest WhatsApp

IoT Devices Used as Botnets

5 DDoS Myths Debunked The Internet of Things (IoT) is under attack, and really, it was only a matter of time. Many of the devices that make up IoT are remarkably unsecure, and in January, ZDNet predicted that a major IoT security breach was going to happen within two years, quoting James Lyne, global head […]

Written By
SP
Sue Poremba
Oct 20, 2016
Slide Show

5 DDoS Myths Debunked

The Internet of Things (IoT) is under attack, and really, it was only a matter of time. Many of the devices that make up IoT are remarkably unsecure, and in January, ZDNet predicted that a major IoT security breach was going to happen within two years, quoting James Lyne, global head of security research at Sophos:

The only reason these flaws aren’t being exploited right now is that hackers currently have little interest, even though these devices are ‘trivial’ to attack, he [Lyne] said. . . . Very soon, we’re likely to see a big breach. It’s quite probable that some really shiny, cool, new product is going to come along in the next year which will see massive adoption by consumers and enterprises. When that happens, I think attacker interest will rise.

The hackers have developed an interest, and IoT is now an attack target. Reports claim that the Mirai IoT malware has now infected almost half a million IoT devices. Also, another piece of malware called Bashlight has infected upwards of a million IoT devices. These infected devices are being used as botnets to create DDoS attacks, most notably against the KrebsonSecurity blog.

As ITPortalPro reported, this malware takes advantage of the poor security on IoT but also the poor security practices of IoT users by using the default usernames and passwords that are supposed to be used only for setup and then changed. But too many of us aren’t changing these defaults, and that’s putting us all at risk. Why? As the article reported, studies show that it takes only six minutes for an IoT device to become infected after connecting to the internet.

As Cesare Garlati, chief security strategist at the prpl Foundation, said to me in an email comment:

The new data confirms the importance of securing IoT devices to prevent massive DDOS attacks. It also confirms the low level of sophistication of the exploit: mainly common/default user ID and passwords. I am afraid advanced hardware security technology can do nothing to protect from negligence or plain stupidity.

Garlati suggested that one possible solution is to ban the sale of any connected devices that ship with standard/default/no passwords. He also added that regulators should step up and force ISPs to temporarily block IP addresses known for being part of active botnets. He concluded:

In the end this is no different than stopping a vehicle with broken tail lights to prevent accidents on a highway. There is no need for new technology to block this kind of unsophisticated attack, just a good dose of common sense.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba.

Save

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.