Your browser is obsolete!

The page may not load correctly.

  • add to favourites
    Add to Bookmarks

If we don't see threats, does that mean they don't exist?

Read: 9538 Comments: 2 Rating: 44

Monday, February 20, 2017

See no evil,
Hear no evil
Speak no evil

This seemingly ordinary lump of coal is on display in a museum. But what’s so special about it?


Well, as a matter of fact, it’s not coal. It's a bomb. But that's not obvious.

During World War II, underground resistance members placed such bombs in coal pits. Zaslonov's guerilla group used the mines, which visually were indistinguishable from black coal, to blow up 93 German locomotives in just three months!

Similarly, an information security threat may persist day in and day out, and remain undetected because looking and seeing are not the same thing. Everyone looks, but few people actually see. And each sees things from his or her own perspective.

For example, this is how criminals launched an attack on bank IT environments from unprotected "smart" devices. The botnet Mirai, which is comprised of Linux devices, appeared only because the users involved didn't change their default passwords or used a very limited set of passwords. The Mirai malware used only 61 login and password combinations in its brute-force attacks on IoT devices! But those were devices that were accessible over the Internet.

Can devices come under attack via a local network? They can, but to accomplish that, attackers will need help from inside.

Smart lamps sound like a good idea. And that’s not just from the point of view of saving energy. Monitoring the status of light bulbs can help detect when their quality is deteriorating and notify users that they need to replace the bulbs or place an order in an online store to stock up. The problem is that all light bulbs (just like most other devices) look the same (can any of our readers tell one bulb from another?). An attacker can screw in a bulb with altered firmware that will enable them to explore the local network and deploy malicious code. A backdoor of this kind can also be deployed in a smart lock or in a smart home's communication components. That way, interaction between the attackers and the malware can be disguised as communication between the home and other nodes on the Internet.

A year ago one would have a hard time imagining a mass infection of IoT devices. But will what we’ve talked about above remain a fantasy, or is this our future?

A year ago one would have a hard time imagining a mass infection of IoT devices. But will what we’ve talked about above remain a fantasy, or is this our future?

To draw an even larger number of machines into the Mirai botnet, criminals created a Trojan for Windows that distributes Linux.Mirai.

And this means that we should be ready for new attacks. #botnet #vulnerability #Linux #Internet_of_things

The Anti-virus Times recommends

And what will you do after reading news about an attack involving infected devices?

  • Change the password on all my devices that connect to the Internet.
  • I recently changed my passwords, so I won't do anything.
  • I never change passwords on devices that connect to the Internet. I think that the manufacturer factored in cases like this so my devices are secure enough.


Tell us what you think

To leave a comment, you need to log in under your Doctor Web site account. If you don't have an account yet, you can create one.