New Botnet Threatens 120,000 Internet-Connected Cameras

Photo of Paul Ausick
By Paul Ausick Updated Published
This post may contain links from our sponsors and affiliates, and Flywheel Publishing may receive compensation for actions taken through them.
New Botnet Threatens 120,000 Internet-Connected Cameras

© Thinkstock

[cnxvideo id=”510063″ placement=”ros”]A new Internet of Things (IoT) botnet has recently been uncovered that threatens to add 120,000 Internet Protocol (IP) cameras vulnerable to attack. The Persirai botnet, as it is known, was discovered by researchers at Trend Micro, according to a Tuesday report at Dark Reading.

A similar botnet, Mirai, was used to drive a massive distributed denial of service (DDoS) attack last October directed at the Dyn DNS servers. The attack is believed to have been caused by about 100,000 endpoints in a single IoT botnet that generated an attack rate of 1.2 terabits per second against the DYN servers.

Trend Micro’s researchers noted more than 120,000 IP cameras exposed on the public internet that are easy targets for IoT malware such as Persirai. One difference between Mirai and Persirai is that the former launched a brute-force login attempt to steal credentials while the newer botnet uses a zero-day vulnerability that can obtain a user’s password file and give the botnet access to the camera.

[nativounit]

According to Dark Reading:

Researchers found affected IP cameras report to C&C [command and control] servers using the .IR country code, which is managed by an Iranian research institute. They also discovered special Persian characters used by the malware author. However, this does not indicate the attacker is Iranian.

Analyst Jon Clay of Trend Micro said:

Attackers behind this are likely to continue and pursue other vulnerabilities, and look for other IoT devices that have similar vulnerabilities associated with them. … [These] devices are going to be used to potentially perform DDoS attacks against other organizations or other people. [Victims are] unwittingly being used as a pawn in a criminal’s efforts.

Part of the problem is that IP camera users don’t always know that their cameras are exposed online and they fail to change the default password.

[wallst_email_signup]

Photo of Paul Ausick
About the Author Paul Ausick →

Paul Ausick has been writing for a673b.bigscoots-temp.com for more than a decade. He has written extensively on investing in the energy, defense, and technology sectors. In a previous life, he wrote technical documentation and managed a marketing communications group in Silicon Valley.

He has a bachelor's degree in English from the University of Chicago and now lives in Montana, where he fishes for trout in the summer and stays inside during the winter.

Our $500K AI Portfolio

See us invest in our favorite AI stock ideas for free

Our Investment Portfolio

Continue Reading

Top Gaining Stocks

CBOE Vol: 1,568,143
PSKY Vol: 12,285,993
STX Vol: 7,378,346
ORCL Vol: 26,317,675
DDOG Vol: 6,247,779

Top Losing Stocks

LKQ
LKQ Vol: 4,367,433
CLX Vol: 13,260,523
SYK Vol: 4,519,455
MHK Vol: 1,859,865
AMGN Vol: 3,818,618