• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 23rd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Events
Cyber Attacks

Firm recall webcams after confirming involvement in Dyn DDoS attack

October 25th, 2016 Waqas Cyber Attacks, Security 0 comments
Firm recall webcams after confirming involvement in Dyn DDoS attack
Share on FacebookShare on Twitter
The webcams played a role in the massive DDoS attacks on Dyn servers and now the company is recalling them.

The sophisticated DDoS attacks on Dyn servers took the world by surprise when 10s of millions of hacked IP addresses forced Internet giants like Twitter, PayPal, SoundCloud and others to go offline. Now, one by one new details about the attack is surfacing the Internet.

Also Read: Internet Connected Car Hacked and DDoSed via Smartphone

In the latest, a Chinese electronics company Hangzhou Xiongmai has acknowledged that hackers compromised its webcams and used it to conduct DDoS attacks on Dyn through the Mirai botnet that is known to be a nightmare for Internet of Things (IoT) devices with default or weak login credentials.

In a statement to BBC, Xiongmai rejected allegations that its webcams made up the bulk of the devices used in the attacks. It also said that the attackers were able to take over cameras because users did not change the default passwords of these devices yet the company has decided to recall its circuit boards and components that go into webcams.

Also Read: Hackers take over security camera; live stream girls’ bedroom on Internet

There are thousands of unprotected security and webcams in the United States ready to used by hackers to conduct further cyber-armageddon. In such circumstances, Xiongmai’s decision to recall their webcams is a drop in the bucket.

Map shows which state have more unprotected cams

Click here to see which state in the US has more unprotected cameras.

[fullsquaread][/fullsquaread]

Remember, it was the Mirai botnet that played a vital role in the DDoS attack on Dyn servers. The fact that Mirai’s developer leaked its source code online also played a vital role in the rapid increase of this botnet. Last month, the same botnet was used for conducting the Internets largest ever DDoS attack of 1 Tbps on OVH hostings as well as the 665 Gbps attack on Brian Krebs blog by hacking over 145,000 webcams.

If you own a security camera or any IoT device HackRead urges you to change their default login credentials now to avoid getting your device compromised and used in further DDoS attacks.

Featured Image Via: WikiMedia

  • Tags
  • Cameras
  • Cyber Crime
  • DDOS
  • internet
  • IoT
  • Mirai
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Hacker Who DDoSed Boston Hospital for OpJustina Facing Charges
Next article Millions of Android Devices Vulnerable to DRAMMER Attack
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Prometei botnet uses NSA exploit, hits unpatched MS exchange servers

Prometei botnet uses NSA exploit, hits unpatched MS exchange servers

Hacked Android phones mimicked connected TV products for fake ad views

Hacked Android phones mimicked connected TV products for fake ad views

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Prometei botnet uses NSA exploit, hits unpatched MS exchange servers
Cyber Crime

Prometei botnet uses NSA exploit, hits unpatched MS exchange servers

Hacked Android phones mimicked connected TV products for fake ad views
Cyber Crime

Hacked Android phones mimicked connected TV products for fake ad views

Signal CEO hacks Cellebrite cellphone hacking, cracking tool
Hacking News

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us