Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security

Botnet with over 25,000 CCTVs launches DDoS attacks

Kyle by Kyle
June 29, 2016
in Security, Information
0
CCTV Exploited for DDoS attack
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

A botnet consisting exclusively of internet-designed closed circuit TV appliances launched queries of HTTP requests to hit a small jewelry store offline for several days.

You might also like

Downthem DDoS service owner gets a 2-year prison sentence

Cloudflare Stops Record-Breaking DDoS

Chrome Browser Extension Vytal Prevents Privacy Leaks

Experts who discovered the botnet stated they weren’t shocked that IoT systems were utilized to execute a distributed denial of service attack but were caught by surprise that it managed to sustain itself for so long and use over 25,000 CCTV devices to do so.

Experts at Sucuri first discovered the store, one of their customers, was being hit with a layer 7 HTTP flood attack that produced 35,000 HTTP requests a second. The analysts saw an uptick in requests coming from a following attack, which peaked at 50,000 requests a second shortly after, and encouraged Sucuri to look further into the attacks.

It was afterwards they discovered 25,513 different IP addresses, the majority of them located in Taiwan.  The botnet was producing a DDoS attack over just a couple of hours, reported Daniel Cid, Founder and CTO of Sucuri, who wrote a blog post about the botnet on Monday.

Securi CCTV botnet map

The remainder of the IP addresses were mainly spread across Indonesia, Mexico, Malaysia, and Israel, but after analysts broke down its geographic dispersal, they noticed the botnet actually relied upon IP addresses from 100+ countries worldwide. As experts proceeded to look into it they found the majority of the botnet’s traffic was originating from devices running Cross Web Server, a kind of software that is used in several types of CCTV DVRs.

device-distribution

The majority of the devices, 46 percent, are H.264 Network Digital Video Recorders. Other systems include CCTV boxes produced by an Israeli company, Provision-ISR, a device manufacturer available in Home Depot and Costco stores, Q-See, and a manufacturer located in Vietnam, Questek, Sucuri reports.

Cid claimed Monday that all the devices are powered by BusyBox, a software that offers Unix tools in a single executable file and can be run in Linux, Android, and FreeBSD.

It’s not likely the CCTV systems will get patched in the near future. If they are, attackers will just move onto the next one, Cid claims.

Tags: botnetCCTVddos
Share30Tweet19
Kyle

Kyle

Co-owner, writer, and editor at ZeroSecurity. Security, Blockchain, and SEO enthusiast. "Formal education will make you a living; self-education will make you a fortune."

Recommended For You

Downthem DDoS service owner gets a 2-year prison sentence

by Christi Rogalski
June 30, 2022
0
Downthem DDoS Service owner sentenced

Matthew Gatrel, a resident of St. Charles, Illinois, has been sentenced to two years in prison for violating the Computer Fraud and Abuse Act (CFAA). The 33-year-old was...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more

WatchDog’s new multi-stage cryptojacking attack unsurfaced

by Christi Rogalski
June 11, 2022
0
WatchDog Targets Docker Containers

Cado Security’s honeypot has recently captured a rather interesting cryptojacker from what they believe to be the WatchDog hacking group. They note that although the attack’s life cycle...

Read more
Next Post
An estimated 10 Million Healthcare records up for sale on the Darknet

An estimated 10 Million Healthcare records up for sale on the Darknet

Related News

Google Chrome Extension fingerprinting source

Google Chrome exposes user extensions to fingerprinting

July 1, 2022
Downthem DDoS Service owner sentenced

Downthem DDoS service owner gets a 2-year prison sentence

June 30, 2022
Cloudflare record breaking DDoS

Cloudflare Stops Record-Breaking DDoS

June 29, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Data Breaches
  • Malware
  • Privacy
  • Contact Us

© 2022 ZeroSecurity, All Rights Reserved.