SHARE
Facebook X Pinterest WhatsApp

Hijacked IoT Devices Used for DDoS Attacks

A new report by Symantec says 2015 was a record year for IoT attacks.

Written By
thumbnail
Sue Walsh
Sue Walsh
Sep 27, 2016

Security firm Symantec recently released a report that found DDoS (Dedicated Denial of Service) attacks using IoT devices are rapidly increasing.

Hijacked IoT devices with malware commonly include web servers, routers, modems, network attached storage (NAS) devices, closed-circuit television (CCTV) systems, and industrial control systems. Hackers create a botnet through a web of hijacked consumer IoT devices, allowing them to launch DDoS attacks with unprecedented amounts of bandwidth. In the case of the recent attack on popular security expert Brian Kreb’s website, PCWorld reported the server was bombarded with a flood of requests at an unheard of 620Gbps.

The compromised IoT devices are sometimes used to launch DDoS attacks against larger targets such as corporations. And it’s not just the manufacturers who are to blame. Symantec’s report found that users are not changing the default user name and password that come with their devices. The top user name and password combinations used in brute force attacks were root and admin and admin and root.

“The current IoT threat landscape shows that it does not require much to exploit an embedded device. While we have come across several malware variants exploiting device vulnerabilities – such as Shellshock or the flaw in Ubiquiti routers — the majority of the threats simply take advantage of weak built-in defenses and default password configurations in embedded devices,” Symantec said.

Symantec noted that with the rapid growth of IoT, increased processing power in devices may prompt hackers to change future tactics, “with attackers branching out into cryptocurrency mining, information stealing, and network reconnaissance.”

The report stated that 2015 was a record year for IoT-based DDoS attacks with over half originating from China. The United States, where 29 percent of these attacks originated, and Russia, where nine percent did, also ranked high on the list. Germany, The Netherlands, Vietnam, UK, France and Ukraine and South Korea rounded out the top 10.

Eight new malware families emerged in 2015, bringing the current total to 12. To stay protected, Symantec advises to what you’re buying, change the default username and password when you set up your device, and keep firmware up to date. Symantec also advises to use wired connections instead of wireless whenever possible, disable services you don’t need, and if you use WiFi, make sure your connection is properly secured with strong encryption.

Advertisement

How bad is IoT security? Very.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.