June 30, 2016 By Douglas Bonderud 2 min read

Internet of Things (IoT) security concerns have shifted from early adopter observations to mainstream worries. As noted by the Computer Business Review, almost 50 percent of companies surveyed said that security was the “biggest inhibitor” to getting the most out of their IoT network.

According to Softpedia, these worries may be worthwhile — a massive closed-circuit television (CCTV) botnet was recently pinpointed as the source of aggressive DDoS attacks. Is this camera compromise the first sign of big IoT trouble?

Smile for the CCTV Botnet!

As noted by Network World, the camera conundrum first came to light when a jewelry store tapped digital defense firm Sucuri to mitigate a serious distributed denial-of-service (DDoS) attack — more than 35,000 HTTP requests were being generated each second, making it impossible for the site to operate. Sucuri dropped the site behind their web application firewall (WAF) and expected the attack to abate, but instead found the intensity ramped up to 50,000 HTTP requests.

This number was worrisome enough, but the company also noticed that there was no flutter to the attacks as bots went online or offline, suggesting that all endpoints connected to the botnet were active at all times.

Research led Sucuri to 25,513 unique IP addresses, all linked to CCTV cameras around the world. Twenty-four percent were located in Taiwan, 12 percent in the U.S. and 9 percent in Indonesia, but all told, 95 different countries had cameras that were part of the botnet. Of note is that 46 percent of these systems were running a generic H.264 DVR made by Chinese firm TVT, which was notified about firmware issues by security expert Rotem Kerner earlier this year, Softpedia reported.

The result? A botnet bonanza — much larger than the first CCTV botnet detected last October, which used only 900 cameras to carry out attacks.

No Small Problem

IoT networks present a unique security challenge: While connected devices are typically small and have limited functionality, in large groups they’re extremely dangerous. Take the camera botnet. Not only were tens of thousands of CCTV endpoints available to compromise, but these devices were designed for i4/7 Internet connection, granting attackers nearly limitless DDoS power.

While there’s interest in better IoT security, new issues continue to emerge. Dark Reading pointed to the recent Nissan Leaf debacle, which saw security researcher Troy Hunt easily hack the car’s climate controls after the vehicle-maker refused to plug the holes in the app, one of which was a total lack of authorization.

Here’s the bottom line: This CCTV botnet is an obvious symptom of a larger disease — the continued corporate assumption that IoT offerings don’t require the same level of IT security as traditional devices. Instead, companies need to think of IoT devices like ants, where a single bite is annoying but 10,000 could be incapacitating. In aggregate, IoT devices are capable of zooming in on even the smallest security flaws.

More from

3 recommendations for adopting generative AI for cyber defense

3 min read - In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The EU and US are beginning to put new regulatory frameworks in place to manage AI risks.Amid all this commotion, hackers and other cybercriminals are hardly…

Debate rages over DMCA Section 1201 exemption for generative AI

2 min read - The Digital Millennium Copyright Act (DMCA) is a federal law that protects copyright holders from online theft. The DMCA covers music, movies, text and anything else under copyright.The DMCA also makes it illegal to hack technologies that copyright owners use to protect their works against infringement. These technologies can include encryption, password protection or other measures. These provisions are commonly referred to as the “Anti-Circumvention” provisions or “Section 1201”.Now, a fierce debate is brewing over whether to allow independent hackers…

CISA Malware Next-Gen Analysis now available to public sector

2 min read - One of the main goals of the Cybersecurity and Infrastructure Security Agency (CISA) is to promote security collaboration across the public and private sectors. CISA firmly believes that partnerships and effective coordination are essential to maintaining critical infrastructure security and cyber resilience.In faithfulness to this mission, CISA is now offering the Malware Next-Generation Analysis program to businesses and other organizations. This service has been available to government and military workers since November 2023 but is now available to the private…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today