As a rule, all malware has a specific

Discuss hot database and enhance operational efficiency together.
Post Reply
relemedf5w023
Posts: 816
Joined: Sun Dec 22, 2024 7:16 am

As a rule, all malware has a specific

Post by relemedf5w023 »

Security Tales: IoT Horrors
Vladimir Bezmaly | 12.04.2017
As always, on Friday, Johann's department was discussing new technologies. Mark asked to speak.

— Johann, I read about the discovery of a new malware by specialists from the R company. It targets IoT devices. The first attacks began literally a few days ago. But there is something alarming in its behavior.

- That is?

— goal. Most often, it is to make a profit. No matter thailand whatsapp data the method. But in this case, everything is completely different.

- That is?

— The malware infects the memory of devices and compromises the operation of the system core. As a result of the attack, the device becomes completely inoperable, that is, it essentially turns into a brick.

— ???

— After the device is rebooted by malware, the IoT device stops working and becomes completely useless — this happens literally a few minutes after infection. Such attacks are called PDoS (Permanent Denial of Service).

— So it turns out that this malware is a new word in the field of IoT malware?

— Yes. IoT malware is usually used to create large-scale botnets, which in turn are useful for DDoS attacks like the one that hit a number of operators and providers around the world. But in this case, it is something unusual: it is unclear how the functionality of the malware can be useful to cybercriminals: the devices it attacks are no longer good for anything.
Post Reply