Disgruntled gamer 'likely' behind October US hacking -- expert | Inquirer Technology

Disgruntled gamer ‘likely’ behind October US hacking — expert

/ 07:39 AM November 17, 2016

A picture taken on October 17, 2016 shows an employee typing on a computer keyboard at the headquarters of Internet security giant Kaspersky in Moscow. / AFP PHOTO / Kirill KUDRYAVTSEV / TO GO WITH AFP STORY BY Thibault MARCHAND

A picture taken on October 17, 2016, shows an employee typing on a computer keyboard at the headquarters of am internet security giant.  AFP

WASHINGTON, United States — The hacker who shut down large parts of the US internet last month was probably a disgruntled gamer, said an expert whose company closely monitored the attack Wednesday.

Dale Drew, chief security officer for Level 3 Communications, which mapped out how the October 21 attack took place, told a Congressional panel that the person had rented time on a botnet — a network of web-connected machines that can be manipulated with malware — to level the attack.

Article continues after this advertisement

READ: ‘Asia’s best’ hacker held for drugs, fraud

FEATURED STORIES

Using a powerful malware known as Mirai, the attacker harnessed some 150,000 “Internet of Things” (IoT) devices such as cameras, lightbulbs and appliances to overwhelm the systems of Dynamic Network Services Inc, or Dyn, which operates a key hub in the internet, according to Drew.

The so-called distributed denial of service attack jammed up traffic routing the Dyn’s servers to major websites like Amazon, Twitter and Netflix for hours before the attack could be overwhelmed.

Article continues after this advertisement

“We believe that in the case of Dyn, the relatively unsophisticated attacker sought to take offline a gaming site with which it had a personal grudge and rented time on the IoT botnet to accomplish this,” he said.

Article continues after this advertisement

Drew did not identify the gaming site but The Wall Street Journal, citing people familiar with the attack, said it was the PlayStation network.

Article continues after this advertisement

At the time, there were worries that a foreign government might have been behind the attack.

READ: FBI probing possible Russian hack of US newsrooms — CNN

Article continues after this advertisement

Drew said the ability of hackers to make use of mundane home electronics to mount such an attack signaled a huge new risk in the global internet circuitry.

He said IoT devices often have easily hackable passwords, including hard-wired passwords that owners cannot change.

“IoT devices also are particularly attractive targets because users often have little way to know when they have been compromised. Unlike a personal computer or phone, which has endpoint protection capabilities and the user is more likely to notice when it performs improperly, compromised IoT devices may go unnoticed for longer periods of time.”

He noted that such devices are widespread around the world, including in areas with few cybersecurity protections, and that the October attack made use of “just a fraction” of those available. Mirai, he said, has infected nearly two million devices connected to the internet.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

“The current lack of any security standards for IoT devices is certainly part of the problem that ought to be addressed.” CBB

TOPICS: Gamer, hacking, Internet, Mirai, technology
TAGS: Gamer, hacking, Internet, Mirai, technology

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.