SHARE
Facebook X Pinterest WhatsApp

IoT Security Flaws Exposed as Mirai Botnet Ravages Internet

thumbnail
IoT Security Flaws Exposed as Mirai Botnet Ravages Internet

Chinese-made DVR and IP cameras may have been easily infected with malware, then enslaved in a botnet to take down a good chunk of the internet.

Written By
thumbnail
Chris Raphael
Chris Raphael
Oct 24, 2016

A Mirai botnet was behind a massive Internet outage that took down Twitter, Reddit, The New York Times,  PayPal and other major websites, according to security firm Flashpoint.

The Mirai malware targets Internet of Things (IoT) devices such as routers, digital video recorders, and webcams/security cameras. These devices are then enslaved into a botnet to launch distributed denial of service (DDoS) attacks.

In the case of last week’s Internet outage, the botnet launched DDoS attacks against the Dyn DNS from tens of millions of IP addresses.

Experts fear that more large and vicious botnet attacks are on the way due to the tens of millions of IoT devices with compromised security, and the publication online of the open-source code for the Mirai malware.

Flashpoint said that that some of the devices used in the Dyn DNS attacks are DVRs, and said it was coordinating with multiple vendors and law enforcement to identify the infected devices used in the botnet.

Brian Krebs, a popular security blogger whose site was attacked by a botnet in September, went a step further and noted that the hacked IoT devices mainly included DVRs and IP cameras made by Chinese hi-tech company XiongMai Technologies.

Update — 10.24 at 12:14 p.m XiongMai has announced a recall of some of its devices, has indicated that most of the problem occurs with users not changing default passwords, and has threatened legal action against publications that blame its technology.

What can be done?

“With a rapidly increasing market for [IoT] devices and little attention being paid to security, the threat from these botnets is growing,” Level 3 Communications reported in September.

“The devices are often operated with the default passwords, which are simple for bot herders to guess,” Level 3 stated. “From the source code it has been found that Mirai’s scanning protocol utilizes a list of generic and device-specific credentials to gain access to susceptible devices.”

Level 3 said IoT manufacturers should disable unused services, such as telnet, and require users to set passwords after installation. “Consumers can improve their security as well by changing default passwords and following security best practices,” the firm stated.

Krebs, however, said on his blog that many of the mass-produced IoT devices are “essentially unfixable” and  “will remain a danger to others unless and until they are completely unplugged from the Internet.”

Advertisement

Hijacked IoT devices used for DDoS attacks

IoT security best practices: expert interview

Why IoT device security remains abysmal 

thumbnail
Chris Raphael

Chris Raphael (full bio) covers fast data technologies and business use cases for real-time analytics. Follow him on Twitter at raphaelc44.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.