Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

What We Can Learn From the Recent Massive DDoS Attack

November 15, 2016 No Comments

Featured article by Rick DelGado, Independent Technology Author

While distributed denial-of-service (DDoS) attacks are nothing new, the scale of one of the most recent ones was truly something to behold. If you woke up on October 21 to see some of your favorite websites down, that’s what happened. Experts are calling it the largest DDoS attack in history, something so massive that commenters said it broke the internet. The major geographic areas affected by the attack centered in the U.S., where regions like the Northeast, Midwest, West Coast, and Texas were hit the hardest. When websites such as Amazon, Spotify, Reddit, and Twitter go down, people tend to notice, and now many are seeking answers. How could such a thing happen, and what can be done about it? Getting to the heart of the matter quickly becomes a priority as we try to learn more about the attack and how to prevent a similar one in the future.

First, we have to understand what the target was. In this case, the attack was launched against Dyn, a company specializing in internet infrastructure with headquarters in the state of New Hampshire. That is part of what separates this attack from others of a similar nature, since an attack against Dyn can impact a large portion of the internet. This attack also came in waves, the first happening early in the morning, the second happening several hours later. Engineers were working well into the evening trying to control and repair the damage from the DDoS attack, but by the end of the day, things were relatively back to normal.

So how was the attack launched in the first place? The answer comes from a place that security experts have been warning about for some time now: the Internet of Things (IoT). More specifically, DVRs and internet-connected cameras from Hangzhou Xiongmai Technology were infected with a type of malware called Mirai, which can build massive amounts botnets used for DDoS attacks. These devices are particularly vulnerable to security threats in part due to their weak default passwords that are rarely changed by users. This vulnerability was exploited, the newly created botnet network was used to overload the target, and large parts of the internet were down soon afterward.

If there’s one lesson to be learned from this incident, it’s that the warnings were correct — the IoT, while definitely useful, is extremely vulnerable to hackers. Internet-connected devices are popping up all over the place, from the appliances in our kitchens to the clothing we wear. Many IoT device manufacturers are taking an “innovation first, security second” approach with the technology as they are quick to infuse objects with internet capabilities while not bothering with the security aspect. As some security experts have noted, this massive DDoS attack could have been easily prevented. More than 500,000 IoT devices were used in the attack, and if they had even basic security features, it might not have happened.

The attack should make companies rethink their approach to developing IoT products. Yes, having a cutting edge idea and pushing it out to market quickly sounds exciting, but the right security steps need to be taken to ensure the devices aren’t vulnerable to hackers. Devices should be reviewed for any vulnerabilities, making them more difficult targets to take advantage of. Everything, from the wireless capabilities to enterprise flash storage should be checked. With the right security strategies, businesses will still be able to make IoT devices while not worrying about the possibility of them being used in a malicious attack.

At the same time, consumers at home will need to do their part. While most people seem to be aware of the risks introduced by the IoT, many aren’t doing anything to improve the security of their own devices. That means changing the default passwords on new devices once they are purchased. That also means keeping up to date with what the latest threats are and how they can be fought. Consumers also need to maintain IoT device security by treating them in the same way they do other devices like their home computers by establishing stronger passwords and locking them when not in use. If both businesses and consumers understand the risks and take even minimal security steps, the chances of another massive DDoS like this one happening decrease dramatically.

 

Rick Delgado V Video Monitoring is Serving Your Business in More Ways Than One

by Rick DelGado, Independent Author

I’ve been blessed to have a successful career and have recently taken a step back to pursue my passion of writing. I’ve started doing freelance writing and I love to write about new technologies and how it can help us and our planet.” – Rick DelGado

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech