Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

SPAM supposedly spotted leaving the fridge

20/01/2014 by

W1siziisijiwmtqvmtavmjgvmtuvntivmtcvnjixl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

It’s still silly season, it seems. Tell the world that a bunch of small business broadband routers have been compromised and recruited into botnets, and the world yawns.

Add in a television or a multi-media centre, and there’s a faint flicker of interest – perhaps a raised eyebrow, but not much more. Add in the word “refrigerator”, as Proofpoint did in this press release, and the world goes nuts.

Which is why, of course, the refrigerator is in there. Here’s what the security outfit actually said about a spam-spreading caper it spotted:

“The global attack campaign involved more than 750,000 malicious email communications coming from more than 100,000 everyday consumer gadgets such as home-networking routers, connected multi-media centers, televisions and at least one refrigerator that had been compromised and used as a platform to launch attacks.”

Let’s put that in context: the “Internet of things”, says Proofpoint, was the source of three quarters of a million messages in a “global attack campaign”. Meanwhile, estimates for the world’s daily spam centre around 100 billion spam messages a day (depending on the success of efforts to disrupt the spammers’ operations.


In other words, what Proofpoint found is, right now, a very small proportion of the world’s attack traffic.

The Register is also concerned that Proofpoint’s media release doesn’t identify which refrigerator (of the handful that run some kind of Linux) was involved (which would enable owners to at least unplug their fridges from the Internet), nor how many messages apparently originated from the fridge.

Here’s another inconsistency that worries Vulture South: since we’re not aware of any refrigerator in possession of its own WAN interface, we presume it was on a home network somewhere, and the router was so insecure that the attackers could recruit it into their botnet. And that they chose to attack the fridge rather than the gateway router that they were passing to reach it.

I guess it makes sense for attackers, like security researchers, to look at new platforms – and that what Proofpoint has turned up is someone’s proof-of-concept.

However, Vulture South is not, as our peers seem to be, lying awake at night over the refrigerator spambot, for a few reasons: the platform itself is constrained; it’s relatively easily detected and defeated; and there are more attractive targets on the same networks as the refrigerators live on.

This article has been extracted from http://www.theregister.co.uk/ to read this article in full please follow this link http://www.theregister.co.uk/2014/01/20/spam_spotted_leaving_the_fridge/

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...