How botnets are breaking into smart homes

On October 21, 2016, a bevy of services suffered internet outage after having been infected by a malware called Mirai that targets smart devices.

October 22, 2016 04:50 pm | Updated November 11, 2017 07:06 pm IST

Happy about your latest Google Home purchase? Or any other smart home device that makes your life easier by providing you the benefits of the Internet of Things? Well, here's something to be wary of: your trusty automated home devices could be transformed into a malicious army of bots that hold your life ransom.

Sound scary? This is what happened on Friday, as major tech companies like Twitter, Netflix, Reddit, Amazon, Spotify — which are catered to by a major DNS service-provider called DYN — suffered malfunctions in their service, an internet outage, because of a malware attack. A DNS essentially helps the computer make sense of a website name by linking it with its IP address.

This malware, now identified as 'Mirai', essentially infects Internet-of-Things devices, floods them with artificial commands and causes them to shut down under a DDoS (distributed denial of service) attack — which means that the devices simply go dead and refuse to perform their functions because of server overload.

DYN said in an interview to CNBC that the "attacks were well-planned and executed, coming from tens of millions of IP addresses at the same time".

Mirai, FYI, has been known to have been responsible for the recent massive attack on cybersecurity news outlet KrebsOnSecurity. It is a botnet malware that was created by someone with the alias of Anna-Senpai, a name that is believed to be a reference to a Japanese novel series Shimoseka , which depicts a dystopian policed world somewhat like George Orwell's 1984 .

How does Mirai do its dirty work?

Mirai runs brute-force scans of default usernames and passwords used by the home devices. Usually, owners of these gadgets use very weak login credentials — usernames and passwords — either because they prioritise ease-of-use and convenience or because of the apparently harmless nature of home appliances.

Once the botnet identifies devices that still use default login credentials, it takes control of the gadget and proceeds to pump forged user requests into the service's network, causing its server to shut down and the website to go offline.

Mirai can affect a bunch of IoT devices, including CCTV cameras, TV video-recorder or even your digital refrigerator.

Who could be responsible for the attack?

It is anybody's guess, really. Because, the Mirai source code was recently leaked and made publicly available by Anna-Senpai on Hackforums, according to KrebsOnSecurity.

What can owners of smart devices do now?

Well, as with most things under the sun, you can reboot your device. But be warned, the botnets are so industrious that they are running scans constantly. So, it is highly likely that your device could be infected again the moment it reboots.

According to ISP and telco Level 3, users may be advised to upgrade their devices and set strong passwords for starters, thereby making it harder for Mirai and other such IoT botnets to hack into or crack them. Another way is for ISPs to set up protection against 'spoofing', which is what the botnet does when it impersonates the users and spurts out a flurry of nonsensical commands and floods the traffic.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.