ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

The Mirai botnet, which was responsible for the attacks on Dyn (which controls much of the Internet) last year, has gradually created an immense network of infected Internet of Things devices. This includes smartwatches, printers, security cameras, and other connected devices enslaved by the malware. These devices are then used to fuel Distributed Denial of Service attacks on various entities. These attacks basically work by assaulting a network with so much traffic that it buckles underneath the weight of the attack and completely shuts down.

While DDoS attacks were once developed for and powered by the ordinary desktop computer, mobile devices, which make up The Internet of Things, have instead become a very versatile means to utilize these botnet attacks.

This increase in popularity isn’t without solid reasoning. IoT devices have spread all over the world for countless and different purposes. After all, there’s strength in numbers, so the more devices that are infected, the better for the attackers. The more Internet of Things devices that are in a household, the more likely that these devices will be used by hackers. With many household appliances like coffee machines, refrigerators, blenders, and so much more now equipped with smart technology, these seemingly benign devices are more dangerous than you think.

There is also the question of how secure these devices are. In many cases, manufacturers don’t build adequate security into these devices, seeing them as no threat to the user. As the events of the DDoS attacks on Dyn make clear, security cannot be an afterthought for Internet of Things devices, as there is much more at stake than people initially realized.

For an example of how this works, take a look at a researcher who decided to put the resilience of a security camera to the test. The researcher subjected the device to Mirai, and it took less than two minutes for the malware to infect it; quite shocking indeed.

In cases like this, there isn’t much that the user can do to protect their IoT devices. These unfortunate events are, however, opening the eyes of the industry as to where IoT devices fall short. Therefore, either these IoT devices will need enhanced security, or they will have relatively short lifespans.

Just how many IoT devices are in your office, and what are you doing about their security flaws? Are you prepared to deal with a BYOD security threat? To find out, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery IT Support Managed Service Windows 10 Browser Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Windows Artificial Intelligence Managed IT services Gadgets Workplace Strategy Networking App Server Virtualization Information Remote Spam WiFi Bandwidth Business Technology Blockchain Encryption Mobile Device Management Gmail Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget History Conferencing Health Big Data Access Control Data Security Analytics BDR Cybercrime Wi-Fi Help Desk Hacking Cost Management Patch Management Remote Computing Vendor Document Management Remote Monitoring Hacker Save Money Voice over Internet Protocol IT Management Compliance Training Employer-Employee Relationship Retail Vendor Management Hard Drive Alert Hiring/Firing Outlook Legal Applications Password Data storage Project Management Vulnerabilities Money Customer Service Unified Threat Management Firewall Mobile Office Augmented Reality Word Managed Services Search... BYOD IBM Data loss Best Practice Website Computing Windows 11 Update The Internet of Things YouTube Twitter User Data Breach Law Enforcement Paperless Office Laptop End of Support Printer Antivirus Maintenance Chrome Monitoring Healthcare Social Sports Travel DDoS Virtual Reality Websites SaaS Social Engineering Mobile Computing Remote Workers Mobility Cryptocurrency Meetings Black Market Windows 7 Marketing iPhone Cleaning Free Resource Cortana Google Maps Running Cable Education Robot Scam Content Filtering How To Storage Router VPN Integration Tech Terms Images 101 Display Chromebook Drones Managed IT Digital Virtual Assistant Automobile HIPAA Employees Taxes Avoiding Downtime How To Wireless Technology Microchip Holidays Flexibility Processor eWaste Cooperation Video Conferencing Physical Security Downtime Safety Identity Theft Hack Notifications Virtual Machines Unified Communications Computer Repair Multi-factor Authentication Virtual Desktop Professional Services PowerPoint Experience Google Docs Start Menu Downloads Computer Care Administration Bluetooth Distributed Denial of Service Presentation Office Tips Vulnerability Saving Time Specifications Private Cloud Memory Software as a Service Managed Services Provider IT Consultant Data Protection Computers Bitcoin Disaster Virtual Private Network Customer Relationship Management Telephone Politics Co-Managed IT Lithium-ion battery Current Events Entertainment Machine Learning Settings Excel Solutions Solid State Drive Processors Tablet Smart Devices G Suite Tip of the week Securty Books Fileless Malware Mouse Society VoIP Gamification Remote Working Tracking Company Culture Domains Language Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Supply Chain Web Server Transportation Troubleshooting Reading Monitors Directions Digital Security Cameras Visible Light Communication SharePoint Windows 8 Content Digital Payment Desktop Wasting Time Modem Electronic Medical Records Worker Accountants eCommerce Access Database Surveillance Workplace Relocation Public Speaking Displays Videos Advertising Tech Support Time Management Public Cloud Managing Costs Streaming Media Work/Life Balance SSID Keyboard Health IT Equifax Spyware Tactics Development Scams Hard Drive Disposal Employer/Employee Relationships Business Owner Hard Drives Audit Media intranet Username File Sharing Virtual Machine In Internet of Things Freedom of Information Wireless Hacks Shortcut Network Congestion Redundancy Reviews Startup Optimization Environment Cache Addiction Cables email scam Teamwork Reliable Computing Heating/Cooling Writing Navigation 2FA Social Networking Unified Threat Management Data Storage Workers Mobile Security Hypervisor Windows XP News Medical IT User Tip Shopping Legislation Network Management Point of Sale CCTV SQL Server Inbound Marketing Scalability Printing Evernote Paperless Text Messaging Proactive IT Touchscreen PCI DSS Licensing Administrator Shortcuts Computer Malfunction Fake News Bring Your Own Device Emergency Proxy Server Gig Economy Emails Humor Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Music Management Regulations Compliance Samsung Device security Managed IT Service Electronic Payment Uninterrupted Power Supply Wireless Headphones Memes Be Proactive Webcam Microsoft Excel Staffing Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards IP Address Phone System Error Financial Data Tablets Botnet IT Workplace Strategies Rental Service Micrsooft Bookmark Risk Management Google Calendar Term Google Apps Download Supercomputer Piracy Flash Telephone Systems Business Growth Virus Telework HTML Nanotechnology Communitications Motion Sickness Microsoft 365 Recovery Competition Browsers Smartwatch Comparison Google Play Google Drive Upload Procurement Software License Computer Accessories Banking Entrepreneur Google Wallet Social Network FinTech LiFi Corporate Profile Screen Reader IT Assessment Smart Technology Documents Messenger Application Deep Learning Knowledge Data Analysis CES Television Security Cameras Business Intelligence Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Business Metrics Hosted Solution Customer Resource management Organization Cabling Devices Cyber security

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?