June 30, 2016 By Douglas Bonderud 2 min read

Internet of Things (IoT) security concerns have shifted from early adopter observations to mainstream worries. As noted by the Computer Business Review, almost 50 percent of companies surveyed said that security was the “biggest inhibitor” to getting the most out of their IoT network.

According to Softpedia, these worries may be worthwhile — a massive closed-circuit television (CCTV) botnet was recently pinpointed as the source of aggressive DDoS attacks. Is this camera compromise the first sign of big IoT trouble?

Smile for the CCTV Botnet!

As noted by Network World, the camera conundrum first came to light when a jewelry store tapped digital defense firm Sucuri to mitigate a serious distributed denial-of-service (DDoS) attack — more than 35,000 HTTP requests were being generated each second, making it impossible for the site to operate. Sucuri dropped the site behind their web application firewall (WAF) and expected the attack to abate, but instead found the intensity ramped up to 50,000 HTTP requests.

This number was worrisome enough, but the company also noticed that there was no flutter to the attacks as bots went online or offline, suggesting that all endpoints connected to the botnet were active at all times.

Research led Sucuri to 25,513 unique IP addresses, all linked to CCTV cameras around the world. Twenty-four percent were located in Taiwan, 12 percent in the U.S. and 9 percent in Indonesia, but all told, 95 different countries had cameras that were part of the botnet. Of note is that 46 percent of these systems were running a generic H.264 DVR made by Chinese firm TVT, which was notified about firmware issues by security expert Rotem Kerner earlier this year, Softpedia reported.

The result? A botnet bonanza — much larger than the first CCTV botnet detected last October, which used only 900 cameras to carry out attacks.

No Small Problem

IoT networks present a unique security challenge: While connected devices are typically small and have limited functionality, in large groups they’re extremely dangerous. Take the camera botnet. Not only were tens of thousands of CCTV endpoints available to compromise, but these devices were designed for i4/7 Internet connection, granting attackers nearly limitless DDoS power.

While there’s interest in better IoT security, new issues continue to emerge. Dark Reading pointed to the recent Nissan Leaf debacle, which saw security researcher Troy Hunt easily hack the car’s climate controls after the vehicle-maker refused to plug the holes in the app, one of which was a total lack of authorization.

Here’s the bottom line: This CCTV botnet is an obvious symptom of a larger disease — the continued corporate assumption that IoT offerings don’t require the same level of IT security as traditional devices. Instead, companies need to think of IoT devices like ants, where a single bite is annoying but 10,000 could be incapacitating. In aggregate, IoT devices are capable of zooming in on even the smallest security flaws.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today