IoT Devices Used to Bring Down the Internet


Attackers used IoT devices to launch a wave of massive DDoS attacks on a DNS service provider

Last week, millions of IoT devices were used to launch a massive wave of DDoS (Distributed Denial of Service) attacks on the managed DNS service Dyn. The attack brought down a big chunk of Internet in the US. Services for Amazon, Twitter, and many other major sites were down for many users.

This is the first attack of its kind involving IoT devices. Attackers behind the Mirai botnet scanned the Internet for IoT devices that were using factory defaults of stock usernames and passwords, then it hijacked those devices, using them to launch the DDoS attack.

Dyn’s Chief Strategy Officer, Kyle York said in a statement, “We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.”

Many device manufacturers, including Chinese vendor Hangzhou Xiongmai Technology, whose webcams and DVR were used in the attack, are recalling their devices. But that probably won't fix the problem, since many users may not even be aware of such attacks and will continue to use their IoT devices with default settings.


Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>


		<div class=