1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IoT botnet highlights the dangers of default passwords

Discussion in 'CSO' started by RSS, Oct 4, 2016.

  1. RSS

    RSS New Member Member

    A botnet responsible for a massive DDOS (distributed denial-of-service) attack was created thanks to weak default usernames and passwords found in internet-connected cameras and DVRs.

    The Mirai botnet grabbed headlines last month for taking down the website of cybersecurity reporter Brian Krebs with a huge DDOS attack. Unlike most botnets, which rely on infected PCs, this one used IoT devices to target its victims.

    It turns out the botnet was specifically designed to scan the internet for poorly secured products like cameras and then access them through easily guessable passwords like "admin" or "12345." Last Friday, the botnet's maker released its source code, and security experts have noticed it's built to try a list of more than 60 combinations of user names and passwords.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page