Here’s Why Malicious Malware Wants Your Smart Home Tech
Monitor devices connected to the Internet, according to experts.
- Security experts have discovered new malware that attacks Internet-connected devices like routers and surveillance cameras to register them with botnets.
- Experts warn that malware authors are always looking for ways to break into devices exposed to the internet for all sorts of nefarious purposes.
- Experts suggest that people can stop such attacks by immediately installing security patches and using fully updated antimalware products.
imaginima/Getty Images
The explosion of unsupervised plug-in-and-forget internet-connected smart devices not only puts owners at risk, but can also be used to defeat popular websites and services.
Researchers recently discovered a new malware variant that targets vulnerabilities in several routers. Infected routers are included in malicious botnets that cybercriminals use to attack websites or online services with junk traffic and disable them from functioning. This is known in cybersecurity jargon as a Distributed Denial of Service (DDoS) attack.
“Unfortunately, there are too many unprotected systems that can easily participate in these attacks,” Ryan Thomas, vice president of product management at cybersecurity solutions provider LogicHub, told Lifewire in an email. “The key for the end user is not to be one of those easy goals.”
we are vogue
Researchers at cybersecurity firm Fortinet stumbled upon a new variant of the popular botnet-roping malware that has learned a new trick to assimilate consumer routers. According to their observations, the rogue behind the Beastmode botnet (also known as B3astmode) “updated the offensive exploit” by adding a total of five new exploits, three of which target vulnerabilities in Totolink routers.
Specifically, this development came shortly after Totolink released a firmware update to address three critical severity vulnerabilities. So while the vulnerability is being patched, attackers expect many users to spend some time before updating their device’s firmware, and some do not.
The Beastmode botnet borrows code from the very powerful Mirai botnet. Prior to their arrest in 2018, the Mirai botnet operator open sourced the code of the deadly botnet, allowing other cybercriminals like Beastmode to copy it and introduce new features that could exploit more devices.
In addition to Totolink, the Beastmode malware targets vulnerabilities in several D-Link routers, TP-Link IP cameras, Nuuo network video recorders, and Netgear’s ReadyNAS surveillance products, according to Fortinet, according to Fortinet. Worryingly, several targeted D-Link products have been discontinued and have not received security updates from the company, leaving them vulnerable.
“Once a device is infected with Beastmode, the botnet can be used by operators to carry out a variety of DDoS attacks commonly found in other Mirai-based botnets,” the researchers wrote.
Botnet operators can make money by selling botnets made up of thousands of compromised devices to other cybercriminals, or they can launch DDoS attacks themselves and then demand ransom from victims to stop the attack. According to Imperva, a DDoS attack powerful enough to bring a website down for days can be bought for as little as $5 an hour.
router, etc.
While Fortinet suggests that security updates apply immediately to all devices connected to the Internet, Thomas suggests that the threat is not limited to devices such as routers and other Internet of Things (IoT) devices such as baby monitors and home security cameras.
“Malware is becoming increasingly cunning and clever at tricking end-user systems into becoming part of a botnet,” Thomas noted. He suggested that all PC users should have their antimalware tools up to date. Also, everyone should do everything possible to avoid suspicious websites and phishing attacks.
imaginima/Getty Images
According to TrendMicro, an unusually slow internet connection is one of the signs of a compromised router. Many botnets also change the credentials of compromised devices. So, if you can’t log in to your internet-connected device with your old credentials (and you’re sure you didn’t enter the wrong password), it’s likely that malware has penetrated your device and changed your credentials.
When it comes to malware that infects computers, Thomas said, consumers should get in the habit of regularly monitoring their system’s CPU usage. This is because many botnets contain cryptocurrency mining malware that steals and abuses your computer’s processor to mine cryptocurrency.
“If your system is running fast with no apparent connectivity, it could be a sign that you are part of a botnet,” warned Thomas. “So when you’re not using your laptop, turn it off completely.”
More information
Here’s Why Malicious Malware Wants Your Smart Home Tech
Supervise your internet-connected devices, say experts
Security experts have discovered a new malware that attacks internet-connected devices like routers and security cameras to rope them into a botnet.
Malware authors are always looking for ways to break into internet-exposed devices to use them for all kinds of nefarious purposes, warn experts.
Experts suggest people can thwart such attacks by installing security patches without delay and using fully-updated antimalware products.
imaginima / Getty Images
The explosion of unmonitored plug-in-and-forget internet-connected smart devices doesn’t just put their owners at risk but could also be used to bring down popular websites and services.
Researchers have recently discovered a new strain of malware that is attacking security vulnerabilities in several routers. Once infected, the compromised routers are roped inside malicious botnets that cybercriminals use to attack a website or online service with junk traffic and choke them out of service. This is known as a distributed denial of service (DDoS) attack in cybersecurity parlance.
“Unfortunately, there are far too many poorly protected systems that can easily be co-opted into these attacks,” Ryan Thomas, VP of Product Management at cybersecurity solutions provider LogicHub, told Lifewire over email. “The key for end-users is not to be one of these easy targets.”
We Are the Borg
Researchers at cybersecurity firm Fortinet ran across a new variant of a popular botnet-roping malware that had learned new tricks to assimilate consumer routers. According to their observations, the bad actors behind the Beastmode (aka B3astmode) botnet have “aggressively updated its arsenal of exploits,” adding a total of five new exploits, with three of them attacking vulnerabilities in the Totolink routers.
Notably, this development came soon after Totolink had released firmware updates to fix the three critical-severity vulnerabilities. So, while the vulnerabilities have been patched, the attackers are betting on the fact that many users take time before updating the firmware on their devices, and some never do.
The Beastmode botnet borrows its code from the very potent Mirai botnet. Before their arrest in 2018, the Mirai botnet operators had open sourced the code of their deadly botnet, enabling other cybercriminals like Beastmode to copy it and infuse new features to exploit more devices.
According to Fortinet, in addition to Totolink, the Beastmode malware also targets vulnerabilities in several D-Link routers, a TP-Link IP camera, network video recording devices from Nuuo, as well as Netgear’s ReadyNAS Surveillance products. Worryingly, several targeted D-Link products have been discontinued and will not get a security update from the company, leaving them vulnerable.
“Once devices are infected by Beastmode, the botnet can be used by its operators to perform a variety of DDoS attacks commonly found in other Mirai-based botnets,” wrote the researchers.
Botnet operators make money by either hawking their botnet made up of several thousand compromised devices to other cybercriminals, or they can launch the DDoS attacks themselves, then demand a ransom from the victim to cease the attacks. According to Imperva, DDoS attacks potent enough to cripple a website for days can be bought for as little as $5/hour.
Routers and More
While Fortinet suggests that people apply security updates to all their internet-connected devices without any delay, Thomas suggests that the threat isn’t just restricted to devices like routers and other Internet of Things (IoT) devices like baby monitors and home security cameras.
“Malware is becoming more insidious and clever at roping end-user systems into becoming part of a botnet,” pointed out Thomas. He suggested that all PC users should ensure their antimalware tools stay up-to-date. Furthermore, everyone should do everything they can to avoid suspicious sites, as well as phishing attacks.
imaginima / Getty Images
According to TrendMicro, an uncharacteristically slow internet connection is one of the signs of a compromised router. Many botnets also change the login credentials of a compromised device, so if you are unable to log into your internet-connected device using existing credentials (and you’re confident you’re not keying in the wrong password), there’s a high chance that malware has infiltrated your device, and altered its login details.
When it comes to malware infecting computers, Thomas said consumers should make it a habit to monitor the CPU usage of their systems at regular intervals. This is because many botnets also include cryptomining malware that steals and hogs your computer’s processor to mine cryptocurrencies.
“If your system is running fast with no obvious connections, this could be a sign that it’s part of a botnet,” warned Thomas. “So when you’re not using your laptop, shut it down completely.”
#Heres #Malicious #Malware #Smart #Home #Tech
Here’s Why Malicious Malware Wants Your Smart Home Tech
Supervise your internet-connected devices, say experts
Security experts have discovered a new malware that attacks internet-connected devices like routers and security cameras to rope them into a botnet.
Malware authors are always looking for ways to break into internet-exposed devices to use them for all kinds of nefarious purposes, warn experts.
Experts suggest people can thwart such attacks by installing security patches without delay and using fully-updated antimalware products.
imaginima / Getty Images
The explosion of unmonitored plug-in-and-forget internet-connected smart devices doesn’t just put their owners at risk but could also be used to bring down popular websites and services.
Researchers have recently discovered a new strain of malware that is attacking security vulnerabilities in several routers. Once infected, the compromised routers are roped inside malicious botnets that cybercriminals use to attack a website or online service with junk traffic and choke them out of service. This is known as a distributed denial of service (DDoS) attack in cybersecurity parlance.
“Unfortunately, there are far too many poorly protected systems that can easily be co-opted into these attacks,” Ryan Thomas, VP of Product Management at cybersecurity solutions provider LogicHub, told Lifewire over email. “The key for end-users is not to be one of these easy targets.”
We Are the Borg
Researchers at cybersecurity firm Fortinet ran across a new variant of a popular botnet-roping malware that had learned new tricks to assimilate consumer routers. According to their observations, the bad actors behind the Beastmode (aka B3astmode) botnet have “aggressively updated its arsenal of exploits,” adding a total of five new exploits, with three of them attacking vulnerabilities in the Totolink routers.
Notably, this development came soon after Totolink had released firmware updates to fix the three critical-severity vulnerabilities. So, while the vulnerabilities have been patched, the attackers are betting on the fact that many users take time before updating the firmware on their devices, and some never do.
The Beastmode botnet borrows its code from the very potent Mirai botnet. Before their arrest in 2018, the Mirai botnet operators had open sourced the code of their deadly botnet, enabling other cybercriminals like Beastmode to copy it and infuse new features to exploit more devices.
According to Fortinet, in addition to Totolink, the Beastmode malware also targets vulnerabilities in several D-Link routers, a TP-Link IP camera, network video recording devices from Nuuo, as well as Netgear’s ReadyNAS Surveillance products. Worryingly, several targeted D-Link products have been discontinued and will not get a security update from the company, leaving them vulnerable.
“Once devices are infected by Beastmode, the botnet can be used by its operators to perform a variety of DDoS attacks commonly found in other Mirai-based botnets,” wrote the researchers.
Botnet operators make money by either hawking their botnet made up of several thousand compromised devices to other cybercriminals, or they can launch the DDoS attacks themselves, then demand a ransom from the victim to cease the attacks. According to Imperva, DDoS attacks potent enough to cripple a website for days can be bought for as little as $5/hour.
Routers and More
While Fortinet suggests that people apply security updates to all their internet-connected devices without any delay, Thomas suggests that the threat isn’t just restricted to devices like routers and other Internet of Things (IoT) devices like baby monitors and home security cameras.
“Malware is becoming more insidious and clever at roping end-user systems into becoming part of a botnet,” pointed out Thomas. He suggested that all PC users should ensure their antimalware tools stay up-to-date. Furthermore, everyone should do everything they can to avoid suspicious sites, as well as phishing attacks.
imaginima / Getty Images
According to TrendMicro, an uncharacteristically slow internet connection is one of the signs of a compromised router. Many botnets also change the login credentials of a compromised device, so if you are unable to log into your internet-connected device using existing credentials (and you’re confident you’re not keying in the wrong password), there’s a high chance that malware has infiltrated your device, and altered its login details.
When it comes to malware infecting computers, Thomas said consumers should make it a habit to monitor the CPU usage of their systems at regular intervals. This is because many botnets also include cryptomining malware that steals and hogs your computer’s processor to mine cryptocurrencies.
“If your system is running fast with no obvious connections, this could be a sign that it’s part of a botnet,” warned Thomas. “So when you’re not using your laptop, shut it down completely.”
#Heres #Malicious #Malware #Smart #Home #Tech
Synthetic: Vik News