Home >> Linux >> Krebs Warns Source Code Leaked From Massive IoT Botnet Attack

Krebs Warns Source Code Leaked From Massive IoT Botnet Attack

Remember that historically massive denial-of-service attack last month against security researcher Brian Krebs? The source code’s just been leaked, Krebs reports, “virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.” An anonymous Slashdot reader quotes KrebsOnSecurity:

The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords. Infected systems can be cleaned up by simply rebooting them — thus wiping the malicious code from memory. But experts say there is so much constant scanning going on for vulnerable systems that vulnerable IoT devices can be re-infected within minutes of a reboot. Only changing the default password protects them from rapidly being reinfected on reboot…

The user who leaked the source code says “there’s lots of eyes looking at IOT now… I usually pull max 380K bots from telnet alone. However, after the Krebs DDoS, ISPs been slowly shutting down and cleaning up their act. Today, max pull is about 300K bots, and dropping”…

Now that the source code has been released online for that 620-Gbps attack, Krebs predicts “there will soon be many Internet users complaining to their ISPs about slow Internet speeds as a result of hacked IoT devices on their network hogging all the bandwidth. On the bright side, if that happens it may help to lessen the number of vulnerable systems.”

He points out that 5.5 million new things get connected to the internet each day, according to Gartner. And they’re also predicting that 6.4 billion things will be connected to the internet by the end of the year — reaching 20.8 billion over the next four years.


Share on Google+

Read more of this story at Slashdot.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

*