Blog
24/10/2016

Concepts #1

The Internet of Things

This week, a news story broke that left everyone stunned—the level of surprise seemed to depend on how much we know about the Internet.

So, to clear things up and help us make sense of the story, let’s break down a few key points.

“Last Friday, October 21st, a DDoS attack took down Dyn, which in turn disrupted dozens of websites, services, and several social networks such as Amazon, Reddit, Github, Spotify, and more. The attack exploited vulnerabilities in millions of connected accessories, devices, and appliances.”

“The attack could have been carried out by people with little technical knowledge, and as of today, there’s nothing we can do about it.”

“This individual or group used botnets, leveraging Mirai to probe the vulnerabilities in device firmware and operating systems.”

diseno-web-barcelona-internet-de-las-cosas-01

These three paragraphs sum up the story that serves as the basis for this post.

First, let’s break them down to identify the key takeaways.

  • It’s shocking how vulnerable even major companies are.
  • You don’t need to work at a particle accelerator to take on a giant.
  • What are botnets? Are they the new weapon of mass destruction?
  • This feels straight out of a Terminator movie.
  • What exactly is the Internet of Things?

There’s nothing more tempting for a hacker than ruining the day for a corporate giant—especially if it means making headlines and getting TV coverage.

So, the main motivation here is fame.

To achieve it, all they need to do is use botnets to flood the targeted websites with requests.

Botnets?

Yes, botnets—the new digital warriors. They don’t tire, they don’t eat, and they barely use up any ammo.

A botnet is a network of computers or devices running automated software robots. The botnet creator remotely controls all infected computers or servers.

From the comfort of their armchair, the creator programs these botnets to infiltrate our computers and, once inside, use them like mind-controlling parasites. The trick is, we don’t even notice.

diseno-web-barcelona-internet-de-las-cosas-03

Let’s say someone builds a botnet for malicious purposes. The first step is to infect millions of computers worldwide. Once that’s done, the next step is to command the bots to do whatever the creator wants.

Servers are simple in principle—they store our websites and deliver them when we request them.

A request can be as simple as visiting the JordiEnsenyatDisseny website to ask for more information. Signing up for your favorite museum’s newsletter is also a request.

When these requests happen organically, there’s usually no problem—server capacity is planned based on typical human usage.

But if millions of computers around the world make requests at the same time, it’s a different story. That’s why bots are used. One person with bad intentions can wield the power of millions through botnets.

To avoid becoming part of this, it’s as simple as installing a good antivirus and, ideally, a malware detection program—essential to keep your computer from joining a zombie network.

By 2020, the number of connected devices is estimated to reach between 22 and 50 billion!

 

But what’s remarkable about this attack is that it was carried out through the Internet of Things.

The Internet of Things refers to all those everyday devices that are now connected to the Internet.

Today, there are countless products on the market with Wi-Fi and Internet connectivity.

Refrigerators that notify you when food is about to expire, sneakers that upload your stats to the cloud, smart toys for kids…

These devices have huge potential, but very little protection against malware attacks. They’re a double-edged sword.

That’s how the attack happened: the Wi-Fi of millions of infected video cameras was used to overwhelm Dyn’s network via Mirai.

Did you like it?
Related articles
Ready to start
your project?

We assess your current situation and outline the next steps.

Contact now
Our site uses cookies to collect information about your device and browsing activity. We use this data to improve the site, ensure security and deliver personalized content. You can manage your cookie preferences by clicking here.
Accept cookies Configure Decline cookies
Basic cookie information
This website uses cookies and/or similar technologies that store and retrieve information when you browse. In general, these technologies can serve very different purposes, such as, for example, recognizing you as a user, obtaining information about your browsing habits or personalizing the way in which the content is displayed. The specific uses we make of these technologies are described below. By default, all cookies are disabled, except for technical ones, which are necessary for the website to function. If you wish to obtain more information or exercise your data protection rights, you can consult our Política de cookies".
Accept cookies Configure
Technical cookies needed Always active
Technical cookies are strictly necessary for our website to work and for you to navigate through it. These types of cookies are those that, for example, allow us to identify you, give you access to certain restricted parts of the page if necessary, or remember different options or services already selected by you, such as your privacy preferences. Therefore, they are activated by default, your authorization is not necessary.rnThrough the configuration of your browser, you can block or alert the presence of this type of cookies, although such blocking will affect the proper functioning of the different functionalities of our website.
Cookies de análisis
Las cookies de análisis son las utilizadas para llevar a cabo el análisis anónimo del comportamiento de los usuarios de la web y que permiten medir la actividad del usuario y elaborar perfiles de navegación con el fin objetivo de mejorar los sitios web.
Confirm preferences
contact us
Form

Tell us
your project

Indicate the general context of your organization and the planned scope of the project.
Code Barcelona, ​​as responsible for the processing of your data, will process it in order to respond to the query and/or request that you make to us through this contact form. Privacy Policy.
Title
Popupcontent
Analysis of your digital situation

We will review your current digital situation. We will get in touch to understand your context and jointly assess which areas to analyze, after which we will prepare an audit including key findings and recommendations.

Code Barcelona, ​​as responsible for the processing of your data, will process it in order to respond to the query and/or request that you make to us through this contact form. Privacy Policy.
Aceptar