The DDoS Threat On IoT Devices Like Routers – TheNationRoar

cso nw ddos attacks by stevanovicigor aka igor stevanovic gettyimages 948533056 2400x1600 100811283 large ProxyEgg The DDoS Threat On IoT Devices Like Routers - TheNationRoar

Storage limitations and network capacity leave simple IoT, Internet of Things, devices such as routers highly vulnerable to cyber-criminals. Distributed Denial-of-Service, DDoS attacks on IoT have become a growing challenge. We are going to look at the types of DDoS attacks and what we can do as users to protect our routers and smart devices.

Use of proxy service

how ddos attacks work c17aed071e ProxyEgg The DDoS Threat On IoT Devices Like Routers - TheNationRoar

The providers of this service have increased vastly. In various case studies, IoT devices have appeared on searches as residential proxies.

Simple IoT devices like routers and other smart devices are already susceptible to DDoS attacks as they are able to connect online without a human giving access. A proxy service like Smartproxy can provide you with a forward proxy to protect your devices.

IoT Devices Vulnerability

iot devices1 ProxyEgg The DDoS Threat On IoT Devices Like Routers - TheNationRoar

By scanning the internet for devices that were exposing their Telnet port, a hacker was able to publish a list of over 500,000 user credentials. The hacker tried various username and password combinations to create a ‘bot list’ from routers and other smart IoT devices. This 2019 infiltration followed a similar list that was leaked in 2017 with 33,000 Telnet routers on it.

It is worth noting that those devices using forward proxies did not appear on either of these lists and remain safe. This fact further supports the use of forward proxies as a means to protect not only your personal data but also access to your IoT devices.

In 2016 a botnet that had managed to accumulate 400,00 bots rendered everyday applications like Twitter, Paypal, Netflix, and Amazon unavailable for hours. The attack infected an internet infrastructure provider with a wave of DNS queries from millions upon millions of IP addresses. The fake traffic blocked genuine DNS inquiries.

What Is a Botnet and Why Is it a Threat?

A botnet can be defined as a network of infected private computers with malicious software. The owners of the computers will not know that the device has been infected and is being used as part of a malicious network of bots. Netlab 360 researchers discovered a botnet that was in control of over 100,000 routers in 2018. Can you imagine the damage a botnet of this size can cause?

The infected house and small-office routers were from different manufacturers. This finding showed that many IoT gadgets ran without any protection and had critical vulnerabilities on their shared hardware. Patches usually provide security. Patches were released to help limit the threat but unfortunately, patching is no help against threats that aren’t discovered at the moment they are released.

The Universal Plug and Play, UPnP, protocol paved the way for a botnet like the one mentioned above to be created. UPnP makes it easier for various devices on a network to find each other and connect automatically. It has been shown to have weaknesses that allow hackers to control all the instruments on a single network. Once infected, devices can proxy to mail servers such as Yahoo Mail, Hotmail, and Outlook.

IoT devices are so well connected that they can affect others on a global scale very quickly if one is infected.

Different Types of DDoS Attacks

DDoS Userstarget ProxyEgg The DDoS Threat On IoT Devices Like Routers - TheNationRoar

A Distributable Denial-of-Service, DDoS, is an unwarranted attempt to deny users access to a service. It is done by interrupting or stopping the service of its hosting server. A botnet can be used to launch a global DDoS attack from one network connection. DDoS attacks prey on the limited resources in IoT devices, thus slowing them down or rendering them completely useless. There are generally three types of DDoS attacks, all of which can cause extensive system damage.

Volume Based Attack

It saturates the attacked site’s bandwidth with UDP floods, ICMP floods, amongst other spoofed-packet floods. Volume Based Attacks are measured in beats per second, bps.

Protocol Attacks

This one eats away at the server resources, putting intermediate communication equipment like firewalls and load balancers at risk. Examples include Smurf DDoS, Ping of Death, and SYN floods. The standard measurement for Protocol Attacks is packets per second, Pps.

Application Layer Attacks

Application Layer Attacks come disguised as innocent and straightforward requests that target the web server. GET/POST floods target Windows and OpenBSD weaknesses. The measurement is done in requests per second, Rps.

The motivation behind DDoS attacks varies, but they have quickly become one of the most common forms of cyber threat. Some hackers are simply bored, while others use DDoS to target business competitors.

How You Can Protect Your Devices

5 password best practices unique passwords authentication 100768646 large ProxyEgg The DDoS Threat On IoT Devices Like Routers - TheNationRoar
  • Change Logins

All routers and similar gadgets come with a default admin login printed on them. As soon as you have set up the device, change the login details. Avoid using easy-to-get passwords.

It is advisable to close off Telnet and any other remote access devices when not in use. Disable any Remote Management settings on the smart device. Attacks can come from a remote computer controlling another one.

  • Disable UPnP Settings

Universal Play-n-Play settings are on all IoT devices by default, inviting all sorts of malware to infect the local network.

  • Use Online Tools

Always keep all your devices updated with the latest software, firmware, and patches. Look for online tools to identify any weakness on your routers and other IoT gadgets.


DDoS and Botnets are becoming more of a threat and in order to combat that threat we need to ensure we take all the necessary precautions. This includes installing updates and patches regularly, using strong passwords and malware protection and even setting a residential proxy to further protect our devices and ensure our anonymity.

Source of this news:

Related posts:

Top 8 Internet Browsers With Built-in VPN For Android & iOS - H2S Media
Here are some best internet web browsers with built-in VPNs to Stay Anonymous while Browsing the internet. Are you worried about your privacy and security while using your smartphone? Do you think...
The Cacophony Of Many Different Server Markets - IT Jungle
September 13, 2021 Timothy Prickett Morgan Considering how skittery the global economy is, how wonky the world’s supply chains are, and how capricious spending by the big public clouds and the...
5 Reasons to use proxies with sneaker bots - Business MattersBusiness Matters
@media screen and (min-width: 1201px) { .tzdlt60e2cb5b3eedc { display: none; } } @media screen and (min-width: 993px) and (max-width: 1200px) { .tzdlt60e2cb5b3eedc { display: none; } } @media screen...
Microsoft Exchange server being hacked by the new LockFile ransomware -
A new ransomware gang, known as LockFile, uses a recently published ProxyShell vulnerability to encrypt a Windows domain after hacking into a Microsoft Exchange server. ProxyShell is the name of an ...
Load Balancer Market Research Report 2021, Size, Share, Growth and Forecast to 2026 - EIN News
Load Balancer Market Report SHERIDAN, WYOMING, UNITED STATES, November 1, 2021 / -- According to the latest report by IMARC Group, titled “Load Balancer Market: Global Industry Trend...
Sep 3, 2020 Under Attack: How Threat Actors are Exploiting SOCKS Proxies - Security Intelligence
From the basic building blocks of the internet to cryptocurrency mining on a supercomputer, SOCKS sits at the core of computing. A SOCKS proxy can be used to improve network security in an enterprise...
The iOS 15 privacy settings you should change right now -
Apple’s iOS 15 has dropped. The latest version of the mobile operating system, and its iPad equivalent iOS 15.5, is rolling out around the world. Apple made the download available after announcing th...
Learn More About Rotating Residential Proxies That Are Sourced Ethically - 2021 Guide -
Learn More About Rotating Residential Proxies That Are Sourced Ethically - 2021 Guide - DemotiX We use cookies to ensure that we give you the best ex...
Microsoft adds Azure capabilities to Windows Server 2022 - SecurityBrief Asia
Barely a month after the launch of Windows Server 2022, users are exploring everything the new platform has to offer, including new features like Hyper-V virtual machine support Released last mo...
‘A whole new attack surface’ , Researcher Orange Tsai report ProxyLogon exploits against Microsoft E...
Adam Bannister 06 August 2021 at 15:48 UTC Updated: 06 August 2021 at 17:17 UTC ‘Possibly the most severe vulnerability in the history of Microsoft Exchange’ Hacking maestro Orange Tsai...
Ideas on how to fix 502 Proxy Desliz or Bad Gateway simply just Game Revolution
502 Have Gateway since 502 Lousy Proxy complications are common issues a user would definitely encounter when trying to go to a website. Unfortunately, the cause to do this error isn’t always de...
Gift Card Gang Extracts Cash From 100k Inboxes Daily – Krebs on Security - Krebs on Security
Some of the most successful and lucrative online scams employ a “low-and-slow” approach — avoiding detection or interference from researchers and law enforcement agencies by stealing small bits of ca...
NGINX Commits to Open Source and Kubernetes Ingress – The New Stack -
At this year’s NGINX Sprint 2.0 virtual conference, NGINX, the arm of F5 behind the popular open source web server/load balancer and reverse proxy of the same name, made several declarations as to i...
Private Cloud Server Market SWOT Analysis including key players Canonical Group, Drobo, Hivelocity V...
A new business intelligence report released by JCMR with Global Private Cloud Server Market Report has abilities to raise as the most significant market worldwide as it has remained playin...
Form F-3 China Finance Online -
Get instant alerts when news breaks on your stocks. Claim your 1-week free trial to StreetInsider Premium here.   Registration No. 333-_______     UNITED STATES SECURITIES AND EXCHA...
Cloudflare Successfully Foils Largest DDoS Attack Ever Recorded In the midst of Mirai Resurgence - O...
The cybersecurity folks when Cloudflare have to be feeling like a million bucks right about now. Or make it a billion smackers. Either way, they are completely justified in reveling at staving...
Microsoft vulnerabilities have grave implications for organizations of all sizes - Help Net Security
Microsoft software products are a connective tissue of many organizations, from online documents (creating, sharing, storing), to email and calendaring, to the operating systems that enable business ...
Getting Started with Identity and Access Management – The New Stack -
Curity sponsored this post. If your business is scaling up, you may find that you deliver many more software applications and APIs than you did originally — all of which will most likely use sen...

IP Rotating Proxy Onsale


First month free with coupon code FREE30