Here's a deeper, less cryptic look, from MIT's Technology Review:
A huge online attack enabled by Internet-connected devices illuminates a problem keeping security experts awake at night.
When the website of security expert Brian Krebs recently went down, it wasn’t bad luck—it was the result of a huge surge of data: 620 gigabits per second. And now we know where it came from. It was an army of Internet-connected devices, being used as slaves to take down servers.
According to the Wall Street Journal, as many as one million security cameras, digital video recorders, and other connected devices have been employed by hackers to carry out a series of such attacks. When corralled together, these pieces of hardware can be used as a so-called botnet, collectively sending data and Web page requests to servers with such ferocity that they’re overwhelmed and ultimately crash.
It’s a powerful new way of putting an old idea into practice. Attackers have long installed malware on PCs to have them act as bots that they control, and more recently home routers and printers have been used to the same ends. But as Internet-connected devices proliferate in our homes and offices, the potential number of devices to draw upon is increasing dramatically.
The scale of the new set of attacks is unprecedented. According to the BBC, this recent spate has been able to barrage servers with data at rates of over a terabit per second. In addition to Krebs’s site, the targets have included the servers of French Web hosting provider OVH. The attacks may have been carried out by the same botnet.
The news raises fresh concerns about the security of Internet of things devices. Purpose-built to be controlled over the Internet, such devices have been billed as the future of sensing and control to businesses and domestic users alike—from connected video cameras and speakers to smart thermostats and lightbulbs. While initially slow to gain popularity, they are proliferating as they’ve become increasingly user-friendly.
But there’s a problem. Many such devices are purchased, installed, and then used without much further attention being paid to their configuration. That means that they may never be updated, leaving huge scope for their exploitation by hackers if they contain a security flaw. (They invariably do.) Who, after all, bothers to update a lightbulb?...MORE