ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

The Mirai botnet, which was responsible for the attacks on Dyn (which controls much of the Internet) last year, has gradually created an immense network of infected Internet of Things devices. This includes smartwatches, printers, security cameras, and other connected devices enslaved by the malware. These devices are then used to fuel Distributed Denial of Service attacks on various entities. These attacks basically work by assaulting a network with so much traffic that it buckles underneath the weight of the attack and completely shuts down.

While DDoS attacks were once developed for and powered by the ordinary desktop computer, mobile devices, which make up The Internet of Things, have instead become a very versatile means to utilize these botnet attacks.

This increase in popularity isn’t without solid reasoning. IoT devices have spread all over the world for countless and different purposes. After all, there’s strength in numbers, so the more devices that are infected, the better for the attackers. The more Internet of Things devices that are in a household, the more likely that these devices will be used by hackers. With many household appliances like coffee machines, refrigerators, blenders, and so much more now equipped with smart technology, these seemingly benign devices are more dangerous than you think.

There is also the question of how secure these devices are. In many cases, manufacturers don’t build adequate security into these devices, seeing them as no threat to the user. As the events of the DDoS attacks on Dyn make clear, security cannot be an afterthought for Internet of Things devices, as there is much more at stake than people initially realized.

For an example of how this works, take a look at a researcher who decided to put the resilience of a security camera to the test. The researcher subjected the device to Mirai, and it took less than two minutes for the malware to infect it; quite shocking indeed.

In cases like this, there isn’t much that the user can do to protect their IoT devices. These unfortunate events are, however, opening the eyes of the industry as to where IoT devices fall short. Therefore, either these IoT devices will need enhanced security, or they will have relatively short lifespans.

Just how many IoT devices are in your office, and what are you doing about their security flaws? Are you prepared to deal with a BYOD security threat? To find out, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Microsoft Office Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Windows 10 Facebook Disaster Recovery Covid-19 Passwords Holiday Managed Service Apps IT Support Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Networking Artificial Intelligence Managed IT services Windows Workplace Strategy Gadgets Business Technology Mobile Device Management Bandwidth Remote Encryption Blockchain Server WiFi App Virtualization Information Spam History Apple Employee/Employer Relationship Information Technology Gmail Office Two-factor Authentication Budget Office 365 Health Cybercrime Analytics Access Control Data Security Big Data Conferencing BDR Wi-Fi Vendor Hacker Employer-Employee Relationship IT Management Training Cost Management Compliance Remote Computing Document Management Patch Management Voice over Internet Protocol Help Desk Save Money Hacking Remote Monitoring Applications Search... BYOD Best Practice Money Computing Vulnerabilities Vendor Management Customer Service Retail Hard Drive Unified Threat Management Firewall Alert Augmented Reality Hiring/Firing Word Outlook Password Legal IBM Website Data loss Data storage Mobile Office Project Management Managed Services Robot Meetings Mobility Storage Google Maps Sports Scam Monitoring Social SaaS DDoS Healthcare VPN Twitter User iPhone Education Cortana Update Law Enforcement End of Support Content Filtering Printer Router Chrome Paperless Office Antivirus Remote Workers The Internet of Things YouTube Maintenance Travel Virtual Reality Windows 7 Mobile Computing Social Engineering Free Resource Cryptocurrency Black Market Laptop Data Breach Marketing How To Cleaning Windows 11 Websites Running Cable Co-Managed IT Downtime Vulnerability Politics Machine Learning Entertainment Settings Safety Software as a Service Images 101 Integration Data Protection Display Solid State Drive Virtual Desktop Experience Multi-factor Authentication Employees Chromebook Avoiding Downtime Drones Automobile Holidays Saving Time Disaster HIPAA Tech Terms Computers How To Bitcoin Cooperation Managed IT Video Conferencing Microchip Telephone Digital Lithium-ion battery Flexibility Virtual Machines Computer Repair Taxes Hack Excel Identity Theft Professional Services Processors Notifications Unified Communications PowerPoint Google Docs Physical Security Administration Managed Services Provider Bluetooth Distributed Denial of Service Virtual Assistant Virtual Private Network Presentation Office Tips Private Cloud Specifications Memory IT Consultant Wireless Technology Start Menu eWaste Current Events Computer Care Downloads Processor Customer Relationship Management Solutions Heating/Cooling Username Uninterrupted Power Supply Supply Chain Management Environment Webcam Value Startup Cyber security Freedom of Information Computer Accessories Windows XP Business Mangement Supply Chain Organization Social Networking Navigation Addiction Tablets Smart Devices email scam Banking Google Wallet Deep Learning Remote Working Mobile Security Messenger Legislation Supercomputer Trend Micro News Google Calendar User Tip Workplace AI Evernote Virus Digital Security Cameras Network Management Electronic Health Records Business Metrics Transportation Hosted Solution Books Motion Sickness Wasting Time Emails eCommerce Fake News Language Modem Society Comparison Proxy Server Google Drive Scams Staffing Videos Service Level Agreement Surveillance Computing Infrastructure Monitors Visible Light Communication Knowledge IP Address Management Corporate Profile Device security Reading Troubleshooting Managing Costs Wireless Headphones Employer Employee Relationship Microsoft Excel SSID Windows 8 Television Telephony Cables Tech Media Going Green Cabling Development Business Cards Employer/Employee Relationships Displays Advertising Error Tablet Relocation G Suite Virtual Machine Reviews Tracking Optimization Work/Life Balance Tech Support Mouse Bookmark VoIP Point of Sale Recovery Term 2FA Competition Download Piracy Teamwork Business Owner Hypervisor Shortcuts Data Storage HTML Web Server Shopping Entrepreneur Nanotechnology In Internet of Things Digital Payment Medical IT LiFi SharePoint Browsers Documents Google Play Paperless Application Upload Worker Software License Hacks SQL Server Network Congestion Licensing Writing Social Network Access Be Proactive PCI DSS Business Intelligence Reliable Computing Gig Economy Screen Reader Public Cloud Humor Data Analysis Time Management Securty Security Cameras Business Communications Trends Internet Service Provider Mobile Technology Azure Inbound Marketing Managed IT Service Audit Domains Customer Resource management Spyware Workplace Strategies Regulations Compliance Devices Scalability Administrator File Sharing Memes Tip of the week Text Messaging Proactive IT Fileless Malware Redundancy Human Resources Gamification Net Neutrality Company Culture Bring Your Own Device Telephone System Cache Financial Data Regulations Unified Threat Management Risk Management Backup and Disaster Recovery Workers Electronic Payment IT Music Directions Google Apps Public Speaking Content Desktop CCTV Streaming Media Printing Electronic Medical Records Smart Technology Telework Accountants Touchscreen Smartwatch Keyboard Database Botnet Communitications Phone System Microsoft 365 Micrsooft Emergency Hard Drives Procurement Rental Service Computer Malfunction Flash Health IT Vendor Mangement FinTech intranet Equifax CES Shortcut Tactics Samsung IT Assessment Hard Drive Disposal Telephone Systems Business Growth Wireless

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?