When surveillance cameras began popping up in the 1970s and ’80s, they were welcomed as a crime-fighting tool, then as a way to monitor traffic congestion, factory floors and even baby cribs. Later, they were adopted for darker purposes, as authoritarian governments like China’s used them to prevent challenges to power by keeping tabs on protesters and dissidents.
But now those cameras — and many other devices that today are connected to the internet — have been commandeered for an entirely different purpose: as a weapon of mass disruption. The internet slowdown that swept the East Coast on Friday, when many Americans were already jittery about the possibility that hackers could interfere with election systems, offered a glimpse of a new era of vulnerabilities confronting a highly connected society.
The attack on the infrastructure of the internet, which made it all but impossible at times to check Twitter feeds or headlines, was a remarkable reminder about how billions of ordinary web-connected devices — many of them highly insecure — can be turned to vicious purposes. And the threats will continue long after Election Day for a nation that increasingly keeps its data in the cloud and has oftentimes kept its head in the sand.
Remnants of the attack continued to slow some sites on Saturday, though the biggest troubles had abated. Still, to the tech community, Friday’s events were as inevitable as an earthquake along the San Andreas fault. A new kind of malicious software exploits a long-known vulnerability in those cameras and other cheap devices that are now joining up to what has become known as the internet of things.
The advantage of putting every device on the internet is obvious. It means your refrigerator can order you milk when you are running low, and the printer on your home network can tell a retailer that you need more ink. Security cameras can alert your cellphone when someone is walking up the driveway, whether it is a delivery worker or a burglar. When Google and the Detroit automakers get their driverless cars on the road, the internet of things will become your chauffeur.
But hundreds of thousands, and maybe millions, of those security cameras and other devices have been infected with a fairly simple program that guessed at their factory-set passwords — often “admin” or “12345” or even, yes, “password” — and, once inside, turned them into an army of simple robots. Each one was commanded, at a coordinated time, to bombard a small company in Manchester, N.H., called Dyn DNS with messages that overloaded its circuits.
Few have heard of Dyn, but it essentially acts as one of the internet’s giant switchboards. Bring it to a halt, and the problems spread instantly. It did not take long to reduce Twitter, Reddit and Airbnb — as well as the news feeds of The New York Times — to a crawl.
The culprit is unclear, and it may take days or weeks to detect it. In the end, though, the answer probably does not mean much anyway.
The vulnerability the country woke up to on Friday morning can be easily exploited by a nation-state such as Russia, which the Obama administration has blamed for hacking into the Democratic National Committee and the accounts of Hillary Clinton’s campaign officials. It could also be exploited by a criminal group, which was the focus of much of the guesswork about Friday’s attack, or even by teenagers. The opportunities for copycats are endless.
You might want to also check out: Internet Security
The Latest on: Internet attacks
via Google News
The Latest on: Internet attacks
- Between Black Friday and Cyber Monday, pope condemns 'virus' of consumerismon December 1, 2019 at 5:27 am
VATICAN CITY (Reuters) - Pope Francis on Sunday urged people to resist the excesses of consumerism in the period leading up to Christmas, calling it a virus that attacks faith and offends the needy ..
- UK attack now political football as Johnson, Corbyn sparon December 1, 2019 at 3:05 am
After a one-day pause out of respect for victims, Friday’s attack is dominating the political scene as the Dec. 12 election nears ... of an electronic device that allows police to track a person’s ...
- Prepare, Hunt, and Respond - Conceptual model against cyber attack by JYVSECTECon November 30, 2019 at 7:48 pm
The idea behind the conceptual model is to represent a comprehensive model for organizations to defend against modern cyber attacks. The model "PREPARE, HUNT, AND RESPOND" will be evolving from the ...
- France Not Ruling Out Response to Cyber Attack on Hospitalon November 28, 2019 at 7:49 am
Cyberwar, How Nations Attack Without Bullets Or Bombs: QuickTake While French police may be limited in their response, national agencies are increasingly launching their own cyberattacks across ...
- GPS Cyber Attacks Pose Threats to the Marine Industryon November 27, 2019 at 11:41 pm
All industries have been a victim to cyber attacks, where marine industries are moving at the top of the list. This is where a penetration testing company can assist marine and offshore companies to ...
- Google Details Its Responses to Cyber Attacks, Disinformationon November 27, 2019 at 9:03 am
Government groups continue to attack user credentials and distribute disinformation according to a new blog post from Google's Threat Analysis Group. In the second quarter of 2019, Google sent more ...
- The Cyber Attack Prevention Checkliston November 27, 2019 at 8:59 am
Do you know the core governance practices to ensure your business is prepared? Discover seven critical factors that will guide board directors and executive teams to a more effective and successful ...
- Port cybersecurity: Safeguarding operations against cyber attackson November 26, 2019 at 10:03 pm
“Given the economic importance of ports in EU trade, the protection of essential port operations against cyber-attacks becomes paramount. It is important to equip EU ports with all necessary tools and ...
- Livingston Public Schools Targeted In Cyber Attackon November 26, 2019 at 4:11 pm
Hackers are holding a New Jersey school district hostage, demanding ransom before releasing student grades and information; CBS2's Ali Bauman reports. Like us on Facebook to see similar stories Please ...
via Bing News