Customize

Internet meltdown October 21

Discussion in 'News and Current Events' started by Disambiguation, Oct 21, 2016.

  1. Disambiguation Global Moderator

    The Internet was all messed up today starting on the East Coast then moving to mid America and then Western states

    https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/
  2. Disambiguation Global Moderator

    The Internet of Things was the engine, the massive DDOS attacks were from slaved printers and climate control.
    https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/
    • Like Like x 1
  3. Disambiguation Global Moderator

  4. Quentinanon Member

    The targeted areas seem to be Washington, D.C., New York City, Boston, Los Angeles, San Diego, England, Belgium and Germany.
  5. "The company sent out updates throughout the day, confirming a second attack at about noon and a third just after 4pm.

    DDoS attacks are also becoming more common. Brian Krebs, an independent security researcher, observed earlier this month that the “source code” to the Mirai botnet had been released by a hacker group, “virtually guaranteeing that the internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices"
  6. Is there anything a home user can do to harden their devices against participating in this kind of attack? I have a SONY smart TV - just received an update two days ago over the internet.
  7. Disambiguation Global Moderator

    watchmojo-poodlecorp.jpg
    Did these rapscallions DDOS the Internet?
    Or these rowdies?
    Cl8Du_4UoAA_rkf.jpg
    Lizard Squad

    Fucking Gamers

    https://nakedsecurity.sophos.com/20...ecorp-members-arrested-in-ddos-for-hire-bust/
  8. Disambiguation Global Moderator

  9. The Wrong Guy Member

    Friday's Massive DDoS Attack Came from Just 100,000 Hacked IoT Devices

    Excerpt:

    How to Protect your Smart Device from being Hacked

    1. Change Default Passwords of your connected devices: If you have got any internet-connected device at home or work, change your credentials if it still uses default ones. Keep in mind; Mirai malware scans for default settings.

    2. Disable Universal Plug-and-Play (UPnP): UPnP comes enabled by default in every IoT device, which creates a hole in your router's security, allowing malware to infiltrate any part of your local network.

    Check for "Universal Plug and Play" features and turn them OFF.

    3. Disable Remote Management through Telnet: Go into your router’s settings and disable remote management protocol, specifically through Telnet, as this is a protocol used for allowing one computer to control another from a remote location. It has also been used in previous Mirai attacks.

    4. Check for Software Updates and Patches: last but not the least, always keep your connected devices and routers up-to-date with the latest vendor firmware.

    More: https://thehackernews.com/2016/10/ddos-attack-mirai-iot.html

Share This Page

Customize Theme Colors

Close

Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins