It largely escaped mainstream attention, but over the past couple weeks we have experienced the largest distributed denial-of-service (DDoS) attack in Internet history, as a bandwidth throughput of close to 1 terabit per second was brought to bear against French hosting company OVH.
This would be noteworthy enough on its own, but the botnet used for this attack was unusual in itself. Rather than being made up of compromised server, desktop, and notebook PCs, it was instead carried out by hundreds of thousands of compromised security cameras:
As more devices are made Internet-enabled, we'll probably see more attacks like this. IP-enabled devices are especially vulnerable because, unlike PCs, they tend not to get updates that fix security vulnerabilities. Usually, the firmware they are delivered with contains the operating system they will use for their entire lifetime. So attacks are likely to only get bigger unless and until security practices surrounding Internet-of-Things (IoT) devices are improved and refined.
This would be noteworthy enough on its own, but the botnet used for this attack was unusual in itself. Rather than being made up of compromised server, desktop, and notebook PCs, it was instead carried out by hundreds of thousands of compromised security cameras:
This botnet with 145607 cameras/dvr (1-30Mbps per IP) is able to send >1.5Tbps DDoS. Type: tcp/ack, tcp/ack+psh, tcp/syn.
As more devices are made Internet-enabled, we'll probably see more attacks like this. IP-enabled devices are especially vulnerable because, unlike PCs, they tend not to get updates that fix security vulnerabilities. Usually, the firmware they are delivered with contains the operating system they will use for their entire lifetime. So attacks are likely to only get bigger unless and until security practices surrounding Internet-of-Things (IoT) devices are improved and refined.