<div dir="ltr"><a href="http://www.sci-tech-today.com/news/Massive-Cyberattack-Triggers-Recalls/story.xhtml?story_id=12200DMHZ8W2">http://www.sci-tech-today.com/news/Massive-Cyberattack-Triggers-Recalls/story.xhtml?story_id=12200DMHZ8W2</a><br><br>The cyberattack that took out huge portions of the Internet last week
has now led to a major product recall. Hangzhou Xiongmai Technology, a
Chinese electronics company, has acknowledged that weak default
passwords on many of its devices were partly to blame for the Oct. 21
attack.
<p>
The components maker, which builds parts for everything from security
cameras to digital recorders, said it would be recalling millions of
Web-enabled cameras that were sold in the U.S. The company described the
attack as a major blow to the Internet of Things movement, saying it
has shaken customer confidence in the level of security of all Internet-capable devices.
</p><p>
<span class="gmail-subhead">This Could Have Been Avoided</span>
</p><p>
Despite the surprise and devastation achieved during Friday’s attack, it
was not inevitable. In fact, Hangzhou Xiongmai said it first become
aware that some of its cameras had a security flaw last year. The
company issued a firmware update to fix the issue last September and
urged customers to change the password from the default setting.
</p><p>
Only devices that were sold before April 2015 failed to update their
firmware. Those devices were still using the default password and were
connected to the Internet when they were exploited, the company said.
That should imply less than 10,000 devices, according to the company's
numbers.
</p><p>
Nevertheless, Hangzhou Xiongmai has agreed to recall up to 4 million
products as an act of good faith. While the company primarily makes
components for industrial and commercial devices, such as surveillance
equipment for banks, stores, and residential areas, most of the devices
it sells in the U.S. are for personal and consumer use. That might
explain why so many devices were running old firmware using the default
password.
</p><p>
<span class="gmail-subhead">The Shape of (the Internet of) Things To Come</span>
</p><p>
Friday’s attack managed to take out huge swaths of the Internet
throughout the U.S., including popular sites such as Twitter and
Netflix, by targeting Dyn Inc., a New Hampshire-based company
responsible for providing much of the domain name service infrastructure
in the US. The group responsible for the attack was able to overwhelm
Dyn’s servers with a distributed denial of service attack.
</p><p>
To achieve their goal, the hackers used a malware tool known as Mirai to
take control of IoT devices, such as security cameras, using Hangzhou
Xiongmai’s hardware components to form a botnet. Once under the hackers’
control, the botnet was able to generate fake network traffic from tens
of millions of IP addresses, overwhelming Dyn’s ability to respond.
</p><p>
So far, the identity of the group responsible for Friday’s attack
remains a mystery, as does whatever motive was behind it. What is
certain is that it represented one of the largest and most sophisticated
attacks against a major Internet infrastructure provider in history.
And the use of IoT devices, rather than laptops or desktops, may
represent a chilling new development in the annals of cybercrime.
</p><p>
Such devices are expected to proliferate in the coming years, and many
continue to lack sufficient security safeguards. Friday’s attack may
prove to be only a glimpse of what’s to come.
</p><br>
</div>