How To Secure Your IoT Devices So That They Are Not Part Of DDoS Attack

Posted: Oct 22 2016, 4:48am CDT | by , in News | Technology News

 

How To Secure Your IoT Devices So That They Are Not Part of DDoS Attack
Credit: Level3 Communications
 

The huge internet outage in the United States was in part caused again by hijacked IoT devices including DVRs, cameras and routers.

Major sites have been not accessible yesterday due to a massive DDoS attack on DNS service provider Dyn. The attack came in waves and wrecked havoc first on the east coast but then spread to the whole country during the day. The attack came from over tens of millions of different IPs. Many of these devices are cheap IoT devices again like in the huge DDoS attack in September.

The hacked IP cameras, DVRs and routers are used to send traffic to targets organized in botnets. Security expert Brian Krebs reports that attack is again based on Mirai. Mirai scans the Web for IoT devices protected only by factory-default usernames and passwords, and then uses the devices in attacks.

While the industry needs to act and enforce better security for any IoT device, consumers should do everything to make sure their devices are not hacked or hijacked. 

How to Protect Your IoT Device from Getting Hacked

First, reset your devices to factory default and disconnect and re-connect the device from power. The power cycle and factory defaults reset gets rid of the malware in case your device is infected. After reboot quickly change the default username and password on your internet connected gadgets via the web admin interface of the device. Chose strong passwords and unusual usernames to make sure the new login can't be easily guessed. Sadly this is not all, as manufacturers did not pay any attention to security whatsoever.

List of hacked devices: Brian Krebs has collected a list of compromised IoT devices that include also brand name products including a Samsung IP camera and a Toshiba Network camera. Big brands also have their cheap IoT products made in China. Overall he spotted 68 defaut username and password combinations the Mirai hacking tool is using. 

Telnet & SSH Problem: Changing the username and password on a compromised device is not a full protection as some of the devices are not changing the login via Telnet or SSH ports. The login information is hard coded in the firmware. Contact or look for a firmware update from the device maker to fix the issue. If no firmware update is available, continue to the next step.

UPnP Router Configuration: If you have your IoT devices such as an IP camera connected at home, it is not accessible from outside the internet, unless the device uses Universal Plug and Play (UPnP), which automatically opens ports in the connected router. You can test if your router lets UPnP traffic through, you can use this online test called Shields Up developed by Steve Gibson. Just point your browser to this url and click the proceed button.

Firewall on Router: Double check your internet router if the firewall is active and properly configured. Get the latest firmware updates and also make sure you have strong admin password on your router.

Only offline is giving you 100% safety.

This story may contain affiliate links.

Comments

The Author

<a href="/latest_stories/all/all/2" rel="author">Luigi Lugmayr</a>
Luigi Lugmayr () is the founding chief Editor of I4U News and brings over 15 years experience in the technology field to the ever evolving and exciting world of gadgets. He started I4U News back in 2000 and evolved it into vibrant technology magazine.
Luigi can be contacted directly at ml@i4u.com.

 

 

Advertisement

comments powered by Disqus