Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

The Mirai botnet, which was responsible for the attacks on Dyn (which controls much of the Internet) last year, has gradually created an immense network of infected Internet of Things devices. This includes smartwatches, printers, security cameras, and other connected devices enslaved by the malware. These devices are then used to fuel Distributed Denial of Service attacks on various entities. These attacks basically work by assaulting a network with so much traffic that it buckles underneath the weight of the attack and completely shuts down.

While DDoS attacks were once developed for and powered by the ordinary desktop computer, mobile devices, which make up The Internet of Things, have instead become a very versatile means to utilize these botnet attacks.

This increase in popularity isn’t without solid reasoning. IoT devices have spread all over the world for countless and different purposes. After all, there’s strength in numbers, so the more devices that are infected, the better for the attackers. The more Internet of Things devices that are in a household, the more likely that these devices will be used by hackers. With many household appliances like coffee machines, refrigerators, blenders, and so much more now equipped with smart technology, these seemingly benign devices are more dangerous than you think.

There is also the question of how secure these devices are. In many cases, manufacturers don’t build adequate security into these devices, seeing them as no threat to the user. As the events of the DDoS attacks on Dyn make clear, security cannot be an afterthought for Internet of Things devices, as there is much more at stake than people initially realized.

For an example of how this works, take a look at a researcher who decided to put the resilience of a security camera to the test. The researcher subjected the device to Mirai, and it took less than two minutes for the malware to infect it; quite shocking indeed.

In cases like this, there isn’t much that the user can do to protect their IoT devices. These unfortunate events are, however, opening the eyes of the industry as to where IoT devices fall short. Therefore, either these IoT devices will need enhanced security, or they will have relatively short lifespans.

Just how many IoT devices are in your office, and what are you doing about their security flaws? Are you prepared to deal with a BYOD security threat? To find out, reach out to us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 03 November 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Google Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Hacking WiFi Facebook Operating System The Internet of Things Microsoft Office Social Media Office Bandwidth Backup Apps Business Continuity Disaster Recovery Communication Mobile Device Management Money Employer-Employee Relationship Network Smartphones Two-factor Authentication History Managed Service Provider Small Business Outlook Phishing App Mobile Computing communications Wireless Technology Big Data Safety Android Unified Threat Management Apple Quick Tips Best Practice Alert Firewall Networking Content Filtering Data storage Cybercrime Data Windows Website Experience Micrsooft Visible Light Communication Disaster Application Data Management Business Growth Customer Service Robot Advertising Recovery Society Sports Spam Router Retail Google Wallet Office 365 Information Technology Running Cable Windows 8 Internet of Things Windows XP IT Services Saving Money Managed IT services Hosted Solution Analytics Lithium-ion battery Artificial Intelligence Documents intranet Tech Support Compliance Bluetooth Drones Social Social Networking Automation Printer Public Speaking Browser Virtual Desktop Virtualization Wireless Memory IP Address Unified Communications Securty Deep Learning Document Management Encryption Government Augmented Reality SaaS Keyboard VoIP BDR Law Enforcement Search User Cortana Vendor Management Proactive IT Hard Drives Remote Computing Shortcut Network Congestion DDoS Save Money Word Monitors Music Heating/Cooling Cryptocurrency Laptop Business Management IBM Displays Google Docs Education Cleaning Competition Holiday YouTube Entrepreneur Processors End of Support Black Market Presentation Office Tips Domains LiFi Staffing BYOD Downtime Streaming Media Help Desk Writing Passwords Hacker
QR-Code