SHARE
Facebook X Pinterest WhatsApp

Mirai May Be Fading, but IoT Dangers Are Not

5 DDoS Myths Debunked The vital question of security vulnerabilities connected to the Internet of Things (IoT) has been brought to the fore during the past few months. The drama has been caused by the Mirai botnet. It is using IoT-connected devices to create distributed denial of service (DDoS) attacks, among other things, and played […]

Nov 10, 2016
Slide Show

5 DDoS Myths Debunked

The vital question of security vulnerabilities connected to the Internet of Things (IoT) has been brought to the fore during the past few months.

The drama has been caused by the Mirai botnet. It is using IoT-connected devices to create distributed denial of service (DDoS) attacks, among other things, and played havoc with the internet during September and last month.

There is more news on the Mirai front. In fact, quite a bit of news. And one piece of it actually, in a qualified way, is good. The first bit is that the crackers attempted to use Mirai to disrupt both the Trump and Clinton campaign websites. Security firm Flashpoint reported that the sites were attacked between the evening of November 6 and the morning of November 7. The firm characterized the four attacks, which were at Layer 7 of the hypertext transport layer protocol (HTTP), as “unsophisticated.”

The qualified good news, hinted at by Flashpoint and more fully explained at Computerworld, is that the power of Mirai is being somewhat diluted because its source code was released. This has led to sort of a bad guy free-for-all among those seeking to use it. The story says that Mirai works across surveillance cameras, baby monitors and similar devices. At least at this early point in the distribution of IoT-related devices, users of Mirai are in essence competing for the relatively few devices of this type that are IoT-connected.

That news is qualified simply because there will come a time when there are many more candidate devices to infect. If the industry does not do its job of better protecting equipment as it proliferates, Mirai will again become a serious threat.

Mirai also was credited with taking a whole country offline. The qualifier is that the country, Liberia, has very weak connectivity. In any case, the story appears to be inaccurate. Indeed, the questions about its veracity were raised by Brian Krebs, who should know: He is an internet security expert and one of Mirai’s earlier targets.

Mirai is a threat that may or may not be fading. The big picture, however, is that the idea of assaulting the internet with DDoS attacks launched at IoT-connected devices is a potent one. Hopefully, manufacturers are listening.

Carl Weinschenk covers telecom for IT Business Edge. He writes about wireless technology, disaster recovery/business continuity, cellular services, the Internet of Things, machine-to-machine communications and other emerging technologies and platforms. He also covers net neutrality and related regulatory issues. Weinschenk has written about the phone companies, cable operators and related companies for decades and is senior editor of Broadband Technology Report. He can be reached at cweinsch@optonline.net and via twitter at @DailyMusicBrk.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.