Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by janrinok on Monday October 03 2016, @04:09PM   Printer-friendly
from the now-it's-a-battle-for-cameras dept.

A few hundred thousand cameras want to talk to you:

A hacker has released computer source code that allows relatively unsophisticated people to wage the kinds of extraordinarily large assaults that recently knocked security news site KrebsOnSecurity offline and set new records for so-called distributed denial-of-service attacks.

KrebsOnSecurity's Brian Krebs reported on Saturday that the source code for "Mirai," a network of Internet-connected cameras and other "Internet of things" devices, was published on Friday. Dale Drew, the chief security officer at Internet backbone provider Level 3 Communications, told Ars that Mirai is one of two competing IoT botnet families that have recently menaced the Internet with record-breaking distributed denial-of-service (DDoS) attacks—including the one that targeted Krebs with 620 gigabits per second of network traffic, and another that hit French webhost OVH and reportedly peaked at more than 1 terabit per second. [...] According to Krebs, the Mirai source code was posted to the hacking community HackForums by a user with the handle Anna-senpai. Krebs said the leaker provided the following explanation:

When I first go in DDoS industry, I wasn't planning on staying in it long. I made my money, there's lots of eyes looking at IOT now, so it's time to GTFO. So today, I have an amazing release for you. With Mirai, I usually pull max 380k bots from telnet alone. However, after the Kreb [sic] DDoS, ISPs been slowly shutting down and cleaning up their act. Today, max pull is about 300k bots, and dropping.

Previously: A Source for Recent DDoS Attacks


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by joshuajon on Tuesday October 04 2016, @01:20PM

    by joshuajon (807) on Tuesday October 04 2016, @01:20PM (#409968)

    My question is who is exposing these things directly to the internet? Most SOHO routers make it fairly simple to do if you understand the basic concepts of LAN / WAN, and NAT, but if these are people who don't even bother to change the default password you'd think they wouldn't be too quick to get this set up. I've got lots of random, probably insecure crap on my LAN, but none of it's exposed. Am I missing something?

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Tuesday October 04 2016, @11:28PM

    by Anonymous Coward on Tuesday October 04 2016, @11:28PM (#410401)

    " if you understand the basic concepts of LAN / WAN, and NAT,". And most home users dont.