News, tips, advice, support for Windows, Office, PCs & more. Tech help. No bull. We're community supported by donations from our Plus Members, and proud of it
Home icon Home icon Home icon Email icon RSS icon
  • Mirai botnet strikes again: This time, IoT via open source

    Home Forums AskWoody support Connected home / Internet of things Questions: Other home/IoT products Mirai botnet strikes again: This time, IoT via open source

    This topic contains 4 replies, has 3 voices, and was last updated by  Kirsty 1 year, 1 month ago.

    • Author
      Posts
    • #213133 Reply

      Kirsty
      Da Boss

      Mirai botnet strikes again: This time it’s going after a specific open source project

      Mirai-powered botnet targets the Internet of Things (IoT) via an open source project named Aboriginal Linux.

      By Macy Bayern | August 23, 2018

       
      Mirai is best known for its massive cyberattack that swept both the US and Europe in 2016, which caused the largest internet blackout in US history. The malware created a massive botnet from IoT devices and attacked Dyn, a domain system for hundreds of major websites.

      Since 2016, Mirai hasn’t been silent. In April, the botnet launched IoT DDoS attacks on the finance industry; and in May, the three new attacks popped up targeting IoT devices.

      Symantec advised taking the following steps to protect your IoT devices from malware and keep your systems safe:

      – Research the capabilities and security features of an IoT device before purchase.
      – Perform an audit of IoT devices used on your network.
      – Change the default credentials on devices. Use strong and unique passwords for device accounts and Wi-Fi networks.
      – Use a strong encryption method when setting up Wi-Fi network access (WPA).

       
      Read the full article here

       
      On the subject of wi-fi security:
      https://www.askwoody.com/forums/topic-tag/krack/
      How to Hack WiFi Password Easily Using New Attack On WPA/WPA2

      2 users thanked author for this post.
    • #213137 Reply

      Kirsty
      Da Boss

      What Is WPA3? More Secure Wi-Fi
      WPA stands for Wi-Fi Protected Access, and it’s a series of security protocols designed to safeguard your Wi-Fi traffic. Here’s what that means for your next binge-watch or video chat.

      By Whitson Gordon | June 27, 2018

       
      The next generation of Wi-Fi security is almost here, and it’s bringing a host of new features to keep your data safe—both at home and on public networks. Here’s everything you need to know about WPA3.

      The Wi-Fi Alliance gave us a peek at WPA3 earlier this year at CES, but this week it officially announced the finalized details. Even though you won’t be able to start using it right away, it’s a big step for wireless security, and good news for laptop and smartphone users everywhere.

       
      Read the full article here

       
      2019 is the target release timeframe, but according to Security Now recently, it’s uncertain which existing devices will update to WPA3.
      Wi-fi Alliance WPA3

      2 users thanked author for this post.
    • #213356 Reply

      AlexEiffel
      AskWoody_MVP

      Symantec’s first line of advice is wishful thinking at the user level.

      Fourth line they suggest WPA… WPA is not safe. WPA TKIP+AES is not safe, WPA2 with only AES is safer.

      We’re not done with the poor state of security on consumer products. Instead of building minimal standards for IoT products that could be easy to see followed with a logo on the box for normal users, it is still the Far West. Security goes well above WPA and the likes. It starts with proper support from the vendors for issuing firmware updates when required.

      1 user thanked author for this post.
    • #213435 Reply

      OscarCP
      AskWoody Plus

      I have this question: is this ‘IoT’ problem also one that affects home users with a wire-based internet connection, but with a WiFi router serving the house computers (and only the computers)?

      I know that routers are vulnerable to malware. I only want to know if the problem discussed here applies to the particular setup I have described above, on top of other vulnerabilities that this setup might already have.

      Thanks.

      Windows 7 Professional, SP1, x64 Group B & macOS + Linux (Mint) => Win7 Group W(?) + Mac&Lx

      • #213513 Reply

        Kirsty
        Da Boss

        is this ‘IoT’ problem also one that affects home users with a wire-based internet connection

        If you are talking about the Mirai Botnet, it affects devices attached to your home network – those “smart” lightbulbs, televisions, fridges etc. This is usually wirelessly, but in the case of larger appliances, may be wired.

        If you are talking about the Wi-Fi WPA* security issues, it affects wireless connectons to your router.

        2 users thanked author for this post.

    Please follow the -Lounge Rules- no personal attacks, no swearing, and politics/religion are relegated to the Rants forum.

    Reply To: Mirai botnet strikes again: This time, IoT via open source

    You can use BBCodes to format your content.
    Your account can't use Advanced BBCodes, they will be stripped before saving.