Over 25,000 IoT CCTV Cameras Used In DDoS AttackOver 25,000 IoT CCTV Cameras Used In DDoS Attack
Probe uncovers attacks generated from 105 global locations and delivering 50,000 HTTP requests per second.
June 29, 2016
More than 25,000 IoT CCTV devices located worldwide have been hacked and are being used for a denial-of-service botnet attack, reports Network World quoting security research firm Sucuri. The botnet, discovered during a jewelry store DDoS attack probe, was found to deliver 50,000 HTTP requests per second.
“It is not new that attackers have been using IoT devices to start their DDoS campaigns,” says Sucuri. “However, we have not analyzed one that leveraged only CCTV devices and was still able to generate this quantity of requests for so long.”
According to Sucuri, the attacks, “a variation of the HTTP flood and cache bypass attack,” were initiated from 25,513 unique IP addresses in 105 countries with 5% of the IPs being IPv6. The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri adding that around 46% of the cameras had default H.264 DVR logos.
Sucuri believes the CCTV devices may have been hacked via the remote code execution (RCE) flaw recently found to affect CCTV-DVR devices sold by some vendors.
Read full story at Network World.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
Build a Case for a Password Manager