IoT Devices as Proxies for Cybercrime. From KrebsOnSecurity. Multiple stories published here over the past few weeks have examined the disruptive power of hacked “Internet of Things” (IoT) devices such as routers, IP cameras and digital video recorders. This post looks at how crooks are using hacked IoT devices as proxies to hide their true location online as they engage in a variety of other types of cybercriminal activity — from frequenting underground forums to credit card and tax refund fraud.
1. Two 19-year-olds charged with running phone harassment, hack-for-hire sites. From ArsTechnica.
Teens started with $20 phone harassment website, then graduated to DDoS.
Federal prosecutors have charged two 19-year-old men with running “hacking-for-hire” websites that attacked companies worldwide and did business with international hacking groups “Lizard Squad” and “PoodleCorp.” Zachary Buchta of Fallston, Maryland, and Bradley Jan Willem van Rooy of the Netherlands, have both been charged with conspiring to cause damage to protected computers.
Buchta walked out of federal court in Chicago yesterday after being released on bail. He was arrested earlier but released on his own recognizance. The judge ruled that Buchta can live with his mother in Maryland while he awaits trial, but he won’t be allowed to access the Internet or have any contact with van Rooy. As for van Rooy, he was arrested in the Netherlands last month and remains in custody there.
Source Code for IoT Botnet ‘Mirai’ Released. From Krebs On Security.
The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.
The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.
Cybercrime Overtakes Traditional Crime in UK. From KrebsOnSecurity. In a notable sign of the times, cybercrime has now surpassed all other forms of crime in the United Kingdom, the nation’s National Crime Agency (NCA) warned in a new report. It remains unclear how closely the rest of the world tracks the U.K.’s experience, but the report reminds readers that the problem is likely far worse than the numbers suggest, noting that cybercrime is vastly under-reported by victims.