A cyber-attack non-standard, which has paralyzed many of the Internet sites has just been completed. And what are surveillance cameras or connected tvs, which have been used in order to achieve it. Decryption.
Ils are the mostinside the planet Web — Amazon, eBay, Spotify, Airbnb, Netflix, Paypal or Twitter, and services of online game consoles PlayStation and Xbox — and all of them were inaccessible for a few hours Friday late afternoon. In question, a computer attack of a magnitude rarely seen. What happened then that today all is back in order ? Explanations.
Who was affected ?
This is not directly the paralysed websites that were targeted, and which are now perfectly accessible, but a u.s.-based company, Dyn. The latter acts as a provider of it services, that is to say that it redirects the flow from the Internet to the sites that use it. Thus, when a user seeks to connect to one of these sites, the query goes through the servers of Dyn translate its request into an IP address, the language that includes all the computers of the world of the Internet.
How the pirates have they done ?
The assault took place in several successive waves for a little over ten hours in the evening of Friday. The technique used is not new and has already been used at the end of September in France against the host of websites on the Internet OVH. This attack, called denial of service is to overwhelm a server with countless requests up to make it inoperative. Most of the time, this type of operation is conducted from a network of zombie computers (‘botnets’ as it is known to hackers), hijacked by viruses and used without the knowledge of their owners. The attack against Dyn is much more insidious because it relies on a network of connected objects and non-protected, such as surveillance cameras or even tv sets. She would have used the botnet Mirai, a software that exploits the security vulnerabilities of these connected objects and the way in which employment has recently been made public on the Darknet, and thus accessible to any apprentice hackeur.
can he reproduce ?
” We are speaking now not of hundreds of thousands of infected computers, but of several millions of connected objects that can serve as a relay for attacks on very large scale, is worried about Chris Moret, head of cyber security at Atos. These objects are not absolutely protected, and this attack, which in my opinion is a trial balloon, to be followed by other… That happens when attackers will target critical infrastructure, such as electricity distribution systems or water ? In the case of black-out, it is a whole country may plunge into chaos in a few hours. “
where the attack is coming from ?
it is Impossible to determine with precision the identity of the crooks or their geographical location. Some experts, in the image of James Scott of the Institute for Critical Infrastructure Technology, believe that the “sophistication” of the attack seems to point the finger at hackers working on behalf of a State like China or Russia. Others see it as the footprint of hackeurs wishing to render justice to the founder of Wikileaks, Julian Assange, a refugee in the ecuadorian embassy in London, and whose access to the Internet has been recently cut.
The computer attacks of the magnitude that prevented Canvas and disrupting the daily lives of millions of people around the world are they coming back ? We believed extinct since the year 2000, and the damage caused by the virus ” I love you “, ” MyDoom “, and others, who had been paralysed up to 10 % of the PC’s that are connected to the planet.
The cyber attack, become criminals in search of easy money rather than exploits it, had since focused on scams targeted more, multiplying the attempts of rançonnage virtual by sending such fake e-mails out account numbers and passwords of their victims.
increased Vigilance and antivirus have been successful as well as struggling to contain all these assaults. With the massive attack which have been victims of the giants of the Net, a new war is brewing. Problem : no anti-virus is now offered to secure millions of connected objects that serve as small soldiers.
No comments:
Post a Comment