Video Camera Hijack
As we progress down the road to the internet of things, businesses and home users need to be concerned with how to secure these “things”. Televisions, Refrigerators, Thermostats, DVR and many more items are now accessible via the internet. A major concern with these devices is they are never updated, leaving them vulnerable to attack.
Last week an estimated 1 million hacked security cameras took part in a distributed denial of service attack which reached a whopping 700 gigabits per second. This equates to 140,000 HD movies being streamed at the same time. When a web site receives this much traffic it is basically taken offline. This is the equivalent of trying to take a drink of water from a fire hose.
Cyber Security Month
October is cyber security month. The Department of Homeland Security website has lots of information available to help with end user awareness.
In their words: “October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not.”
National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident: https://www.dhs.gov/national-cyber-security-awareness-month
It was recently found that 400 apps in the Google apps store are actually malware. This malware turns unsuspecting users phones into listening posts that could steal data out of the networks they are connected to. The malware disguises itself as a legitimate application.
The report states: “The malware installs a SOCKS proxy on the device, building a general purpose tunnel that can control and give commands to the device. It can be used to turn devices into bots and build a botnet, which is essentially a network of slave devices that can be used for a variety of schemes like distributed denial-of-service (DDoS) attacks—which have become an increasingly severe problem for organizations worldwide—or spam email campaigns. The botnet can use the proxied IP addresses also generated by the malware to create fake traffic, disguise ad clicks, and generate revenue for the attackers.”
Here is a partial list of infected apps: