SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Legacy of cybersecurity apathy plays into Mirai botnet attack

Legacy of cybersecurity apathy plays into Mirai botnet attack
Legacy of cybersecurity apathy plays into Mirai botnet attack
Legacy of cybersecurity apathy plays into Mirai botnet attack
Legacy of cybersecurity apathy plays into Mirai botnet attack
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Related Links
  • 13 tips for security and IT professionals to keep IP video surveillance networks secure
  • Data mining for insider threats: Another convergence of physical and cyber security
  • Why Hikvision is suddenly front-page news: The company responds to security concerns

A big cyberattack on Friday impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cyber security attacks later in the day were more global in nature. But Oct. 21, 2016, will also be remembered as the day our physical security industry’s legacy of apathy toward cybersecurity came back to haunt us.

Denial of service attack

The cyberattack last week was carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. Bots can infiltrate unprotected computers and then use the computing power of their “hosts” to carry out various kinds of cyber-attacks on other Internet targets. In the case of Friday’s attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack.

Because of Friday’s attack, prominent websites such as Twitter, Spotify, and Reddit were inaccessible during periods of time throughout the day.

The problem for our marketplace – and the reason Friday’s attacks will forever highlight our historic apathy toward cybersecurity – is that many of the attacking bots in the scenario above were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s products to launch Friday’s headline-grabbing cyberattack.

The problem for our marketplace
is that many of the attacking
bots in the scenario above were
hosted by IP-enabled cameras
and digital video recorders

Easy infiltration

Bots can infiltrate a computer or other device without any overt signs of trouble. A DVR, for example, can continue to operate as expected. The owner or operators of the equipment might not even know they have been infected. Because the equipment is still operating, no alarms are raised. The impact is only felt when those hidden bots are called to action (through their connecting network) to launch a cyberattack.

To be fair, cameras and DVRs were not the only devices hosting bots that were involved in Friday’s attack. Home networking gear, routers, phones and other connected (and hackable) devices were also involved. (Cybersecurity is an important consideration in the Internet of Things.)

Mirai Malware Program

Every device hosting a bot in Friday’s attack was infiltrated by a malware program called Mirai. Reportedly only 10 percent of existing Mirai-compromised hosts were involved in Friday’s event. It’s scary to consider how much damage can be done by a mere fraction of the bots out there waiting for their orders to attack. Increasingly, botnets are commodity resources that can be “rented out” by cyber criminals as tools for nefarious purposes.

How did the Mirai bots infiltrate their hosts? One factor was known default or weak credentials. In other words, host devices used their default login information and passwords. Failing to change the login and password when installing an IP camera or DVR was not uncommon in the days before physical security professionals began to wake up to the possible threats of cybersecurity. (It probably still happens today!)

It’s scary to consider how
much damage can be done
by a mere fraction of the bots
out there waiting for their
orders to attack

We in the physical security market have only been talking about cybersecurity for a year or two, and equipment before that time was often installed without even a cursory consideration of cybersecurity.

Another aspect is that the virus infiltrated through telnet connections. Among today’s best practices is to turn telnet access “off.” But years of less-than-optimal installations are still out in the world, still subject to botnet infiltration, still part of the problem that was so dramatically demonstrated last week.

Ignorance towards cybersecurity

And how much effort are we making today to diagnose any possible malware infestation of existing cameras and DVRs in the field? The tendency is to ignore the possibility of malware as long as the equipment keeps chugging along. How much is our continuing complacency a factor in last week’s attack? Or next week’s? Or an even larger and more devastating attack in the future?

So far, much of the discussion of the impact of cybersecurity on our market has been theoretical. (Although there have been other actual events to consider.) Friday’s cyberattack will no doubt raise the urgency of these concerns, and (hopefully) accelerate our pace of addressing the issues. They demand our attention.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Network cameras
  • IP Surveillance
  • IP security solutions
  • Cyber security
  • Data Security
  • Network Video Recorders
  • Video surveillance
  • Related categories
  • Digital video recorders (DVRs)
  • CCTV software
  • IP cameras
  • IP Dome cameras
  • Network video recorders (NVRs)
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Security beat
About this page

Boost cybersecurity with proactive solutions; prevent Mirai botnet attacks exploiting legacy system vulnerabilities.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec