Internet-connected devices are nearly ubiquitous, with computer circuitry now found in a variety of common appliances. They can include security cameras, DVRs, printers, cars, baby monitors, and refrigerators — even "smart" lightbulbs and clothing. Collectively those devices are called the internet of things (IoT).
The internet of things is a big, juicy target for criminals. Up to a million devices were hijacked to create the Mirai botnet, which was used to extort companies and bring a university computer system in New Jersey to its knees. The botnet was later exploited to bring down vast swaths of the internet in a sustained attack on Oct. 21, 2016.
Paras Jha, a former Rutgers University student, pleaded guilty Dec. 8 with two other men who admitted they wrote the Mirai code. Named after an obscure anime film character, Mirai scoured the internet for unsecured devices and easily found them.
Once discovered, the IoT devices were hijacked by the Mirai malware and became part of a botnet that launched assaults on internet service providers and scores of websites. Jha, 21, allegedly monetized the botnet by demanding ransom to call off the attacks, using it to inflate the number of advertising clicks on websites, and renting it out to other hackers for their own nefarious ends.
The attacks on Rutgers' computer system may have cost the school $9 million, prosecutors said. Rutgers officials told NJ.com the cost of enhancing security was one of the reasons the school hiked tuition in 2016.
When Jha discovered federal investigators were closing in, he released the Mirai source code to the world to cover his tracks. The code is still circulating online and causing damage, according to Brian Krebs of KrebsOnSecurity.com.
Krebs advises taking these precautions to keep your IoT devices protected:
- Avoid connecting your devices directly to the internet.
- Change the default credentials to a complex password that only you will know and can remember.
- Check the defaults, and make sure things like UPnP (Universal Plug and Play — which can easily poke holes in your firewall without your knowing it) are disabled.
- Avoid IoT devices that advertise built-in Peer-to-Peer (P2P) capabilities. P2P IoT devices are notoriously difficult to secure, and research repeatedly has shown that they can be reachable even through a firewall remotely over the internet. That's because they're configured to continuously find ways to connect to a global, shared network so that people can access them remotely.
- When it comes to IoT devices, cheaper is definitely not better. There is no direct correlation between price and security, but history has shown that less expensive devices tend to have the most vulnerabilities.
The Department of Justice also offers these tips to protect internet-connected devices.