• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 16th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

Hacker Maps Internet by Enslaving Thousands of Vulnerable Machines

March 21st, 2013 Waqas Security 0 comments
Hacker Maps Internet by Enslaving Thousands of Vulnerable Machines
Share on FacebookShare on Twitter

A security researcher has raveled some fantastic results over the percentage of vulnerable networks and devices around the world. His technique as a hacker was pretty straightforward and was a big time a matter of concern for all the people around the world. Let’s then see what the researcher found through his researches and how was he able produce such results.

1C6547821-clientmap-16to9-1600x900.streams_desktop_medium

A map showing the locations of the botnet’s hundreds of thousands of infected devices.

Though, all these research was illegal it was carried out with nice intentions. The researcher in this scanned all the Ip addresses that were linked to the devices that were open for modifications. Through, this scanning, the researcher gained access to a number of devices all the compromised devices allowed him to gain to access to more IP addresses.

This way he was able to gain access to botnets of more then 420,000 devices in a single day. Most of the devices were really easy top got hold off the researcher found most the devices password and username: ‘default’ and admin’. Though, all these devices were simple devices they aren’t much worth of. These included printer and appliances, which were connected to the internet.

Working together these devices can trace ip addresses within an hour time. For researcher, it was a case in which robbing of one of one allowed him to find knobs of all the doors related to it. He himself admitted this as an illegal act in these words:

“This is most definitely illegal,” Roel Schouwenberg, senior researcher at Kaspersky Lab, told NBC News in an email. “Even if the intentions are good, which we have no way of verifying. unauthorized access remains unauthorized access.” Even if the compromised devices were thermostats or modems, “it doesn’t matter if it involves a regular desktop computer or a router.”

1C6547822-hilbert-icmp-map-lowquality.streams_desktop_medium

A map of the Internet, showing machines that responded to pings in various colors, while secure or unresponsive addresses are black.

But, researcher at the same time admitted he hasn’t caused damage to any of the data he found from the compromised devices all the botnet were safe and were easily removable. As a proof he showed one of the devices compromised by malicious software. He helped it by some code to be protected from such softwares. He also has build a massive database on all the IP addresses he traced out, the size of the data is bigger then the largest hard drive available in the market i.e. 9 terabytes.

1C6547789-map2.streams_desktop_medium

A close-up of data relating to a range of IP addresses scanned by Carna.

The main reason behind all this for the researcher was to give awareness to the people regarding the importance of strong login details in the internet world. Lastly, it determines how easily hackers can compromise the devices and steal significant data over the internet.

Source of Images and News: NBC News.

Follow @HackRead

  • Tags
  • hackers
  • hacking
  • SECURITY NEWS
  • Vulnerability News
  • Vulnerable IP Addresses
  • Vulnerable Machines
Facebook Twitter LinkedIn Pinterest
Previous article More 192 Websites Defaced by Charaf Anons of Anonymous Algeria
Next article BBC Network Twitter Accounts Hacked by Syrian Electronic Army
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
2021 and Emerging Cybersecurity Threats

2021 and Emerging Cybersecurity Threats

Unpatched MS Exchange servers hit by cryptojacking malware

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
2021 and Emerging Cybersecurity Threats
Security

2021 and Emerging Cybersecurity Threats

SolarWinds Hack - US officially Blames Russian Intel Agency Hackers
Cyber Crime

SolarWinds Hack - US officially Blames Russian Intel Agency Hackers

ParkMobile parking app data breach - 21M user records stolen, sold
Hacking News

ParkMobile parking app data breach - 21M user records stolen, sold

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us