Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Using hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company – Dyn, leading to a mammoth internet outage that affected major websites like Twitter, Reddit, Netflix, Spotify, Tumblr and Amazon. Dyn manages domain name system (DNS) services.
The attack had caused network congestion that prevented users from accessing these websites. Cyber criminals had recruited digital video recorders, CCTV video cameras and other such IoT devices for the DDoS attack.
Cyber security experts have discovered that the hackers had used the Mirai malware that had earlier been used in other major DDoS attacks. Adding fuel to fire, the creator of the Mirai malware using the nickname “Anna-senpai,” had publicly released the Mirai source code on Hackforums – a popular English-language hacking forum. Now, every cyber criminal has been given a powerful malware tools on a platter. All they have to do is unleash it to build their own bot armies.
How the Mirai Works?
Mirai targets IoT devices with their default username and passwords, plus a little more that default values. In many instances, users have not changed the factory-default usernames and passwords. In some cases these credentials – user name and password or password alone are hard-coded into the device and cannot be changed. Whether this demonstrates the careless attitude of the IoT device manufacturer or whether it has been purposefully done, will be known in the days to come.
Even when the credentials can be changed, some of these devices can be accessed and compromised through “Telnet” and “SSH.”
When the Mirai gains access to IoT devices it enlists these devices into its bot army, and uses them in DDoS attacks at specific targets. The enlisted devices hurl junk traffic that overwhelm the handling capacity of the website till legitimate visitors are no longer able to access the website. Cyber experts believe that multiple botnets could have been used in the attack against Dyn.
The Dyn Target
Analysis of the Dyn attack by cyber security experts has revealed that most of the IoT devices in the botnet belonged to IP cameras and digital video recorders manufactured by XiongMai Technologies, China. Further, XiongMai components are also used by other vendors in their devices.
These IoT devices are widely used as they are inexpensive. While the manufacturer has claimed that the bug has been fixed in later released devices, there seem to be plenty and plenty available for bot recruitment. And as long as they are being used, they can be recruited for abuse.
Cyber criminals had launched three DDoS attacks against Dyn. Considering the grave nature of the internet being brought down, the US Department of Homeland Security has launched an investigation. Vulnerability scans of IoT devices must determine the security of the accessibility of IoT devices. Sophisticated vulnerability scans on the same lines of the Mirai must be used to find out devices that can be easily compromised and appropriate protection measures must be taken.
Wikipedia Hacked by DDoS Attack
Tags: vulnerability scanning
Reading Time: 2 minutes Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot take place. How do we know? Because 21% of internet visitors won’t shop online at all! And many more shop on only a few, very large sites. Yet establishing trust with customers is critical because it allows you to engage with…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats