As scary as the epidemics of malware for Internet of Things devices have been, they had one saving grace: because they only lived in RAM (where they were hard to detect!), they could be flushed just by rebooting the infected gadget.
But a new strain of malware, dubbed "Hide n Seek," can live through a power-cycle: it writes a copy of itself to the /etc/init.d/ directory in the IoT device's embedded GNU/Linux system, where startup programs are stored. When a device that's been infected this way is rebooted, it is freshly infected.
Bitdefender experts first spotted the HNS malware and its adjacent botnet in early January, this year, and the botnet grew to around 32,000 bots by the end of the same month. Experts say HNS has infected 90,000 unique devices from the time of discovery until today.
Crooks used two exploits to create their initial botnet, which was unique from other IoT botnets active today because it used a custom P2P protocol to control infected systems.
Now, experts have found new HNS versions that have added support not only for two other exploits [1, 2] but also for brute-force operations.
What this means is that HNS infected devices will scan for other devices that have an exposed Telnet port and attempt to log into that device using a list of preset credentials.
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots [Catalin Cimpanu/Bleeping Computer]
The increasingly popular social media application TikTok has a concerning relationship with the Chinese state. That link became ever the more concerning today, when reports began circulating of a brand new partnership between the company that owns TikTok, ByteDance, and the government of China.
Nulledcast is a realtime podcast streamed on a Discord channel for the hacking forum Nulled: the hosts break into Ring and Nest cameras in realtime, blare sirens at the owners, then torment them with insults and racist slurs, livestreaming their responses to hundreds of listeners.
A family in DeSoto County, Mississippi, bought a Ring security camera so they could keep an eye on their three young girls in their bedroom. Four days later, they learned that a hacker had broken into the camera and subjected their children to continuous bedroom surveillance, taunting the children through the camera's built-in speaker.
There are fast-paced card games, and some of them even require enough dexterity for a mini-workout (like Skip-Bo or Snap). But there’s nothing quite like the Mokuru® Card Game, which uses an already addictive fidget toy as the centerpiece for a cutthroat game of tabletop challenges. The game is named for the toy that gets […]
People who ask themselves why they need a dashcam usually have one thing in common: They’ve never been a serious collision. Even in fender benders, these gadgets can save you an immense amount of time and hassle, stopping headaches before they even start. If you’re looking for a reliable starter cam, the myGEKOgear Orbit 110 […]
There’s no shortage of wireless chargers out there. So when one scores a Best of Innovation Award at the Consumer Electronics Show, we take notice. And, those industry nods mean good news for just about anybody with a smartphone, because the HyperCharger X Wireless Charger means there’s no excuse for losing power when you’re out […]