IoT is a hotbed for Botnets

Sep 19 2023

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that stands up to the scammers and the hackers, the crypto-jackers, source code-crackers and spyware trackers and screams: “I’m as mad as hell, and I’m not going to take this anymore!โ€ ๐Ÿ˜ก๐Ÿ˜ก๐Ÿ˜ก #Network

Todayโ€™s hottest cybersecurity news stories:

  • โš ๏ธ Beware of new wave of DDos attacks coming for your IoT devices ๐Ÿ”Œ

  • ๐Ÿ’ฐ Google will pay $93 million to state of California over privacy violations ๐Ÿ•ต๏ธ

  • ๐Ÿค“ Boomers beware! Nodestealerโ€™s coming for your Facebook accounts ๐Ÿค๐Ÿ‘€

Todays Headline Sponsor

If you are a techie and/or in to compliance and security then this newsletter will be right up your street. Its a well written newsletter with great content on software and websites for developers and businesses that use software or rely on 3rd party suppliers for services with a security and compliance focus, lets be honest all business should have a security and compliance focus ๐Ÿ˜ฌ

Sponsored

The grnmrk Newsletter

Highlighting companies with fresh new security and compliance certifications โšก๏ธ

Subscribe

๐Ÿค– Botnets: Can I hack it? DDoS you can! ๐ŸŽถ

๐ŸŒ IoT is a hotbed for Botnets (Distributed Denial of Service attacks) ๐Ÿค–

IoT’s popularity is soaring, but it’s also making our devices vulnerable! ๐Ÿ˜ฑ Poorly secured IoT gadgets are prime targets for attackers, turning them into unknowing members of botnets. These botnets can launch various attacks, from DDoS to data theft, without you even knowing. ๐Ÿ˜ฌ

Hang on, wtf are IoT devices again?! ๐Ÿค”

Here’s a short list of examples of Internet of Things (IoT) devices:

๐ŸŒก๏ธ Smart Thermostat: Devices like the Nest Thermostat can be controlled remotely and adapt to your heating and cooling preferences.

๐Ÿ”’ Smart Lock: These locks can be controlled via a smartphone app, allowing you to lock and unlock your doors remotely.

๐Ÿ’ก Smart Light Bulbs: Bulbs like Philips Hue can be controlled and programmed to change color and intensity via a mobile app.

โค๏ธ Fitness Trackers: Devices like Fitbit monitor your physical activity, heart rate, and sleep patterns, providing valuable health data.

๐Ÿ“น Smart Home Security Cameras: Cameras from companies like Ring or Arlo offer remote monitoring and alert notifications.

โ„๏ธSmart Refrigerator: Some modern refrigerators can send alerts when you’re low on groceries and even create shopping lists.

๐Ÿš— Connected Cars: Cars with IoT capabilities can provide real-time diagnostics, GPS tracking, and in-car entertainment options.

โŒš Smartwatches: Devices like the Apple Watch can track fitness, display notifications, and run apps.

Almost every appliance and gadget in your house now has a โ€˜smartโ€™ equivalent from smart washing machines to smart toasters (seriously! ๐Ÿ˜‚). Needless to say, some of these inventions are more game-changing than othersโ€ฆ

๐Ÿšจ Why Worry About IoT Botnets? ๐Ÿšจ

With over 16 billion IoT devices in 2022 (expected to double by 2025), they’re a goldmine for attackers. Many devices lack updates or secure settings, making them easy prey. ๐Ÿ˜ต

๐Ÿ’ฅ How IoT DDoS Attacks Happen ๐Ÿ’ฅ

Attackers command botnets through a server, targeting victims. Bots flood the target with requests, causing service failures. When essential systems are hit, lives can be at risk! ๐Ÿ˜จ

๐Ÿ”— Incorporating IoT Devices into Botnets ๐Ÿ”—

Hackers compromise new IoT devices, expanding botnets. They use a loader server to install malware, turning devices into bots. ๐Ÿ˜ˆ

โš ๏ธ Current IoT DDoS Threat โš ๏ธ

IoT-driven DDoS attacks surged 300% in H1 2023, causing $2.5 billion in losses. 90% of complex attacks are botnet-based. This trend isn’t slowing down. ๐Ÿ˜ซ

๐Ÿ”ฎ Alarming Projections for 2023โ€“2024 ๐Ÿ”ฎ

As IoT grows, so will botnet attacks. Experts predict a significant threat as IoT devices climb to 27 billion by 2025. Brace yourselves! ๐Ÿ˜ฌ

๐Ÿ›ก๏ธ Defensive Measures: Strategies and Best Practices ๐Ÿ›ก๏ธ

  • Educate users about IoT safety

  • Collaborate and share threat info

  • Keep devices updated

  • Implement multi-layer security

  • Invest in specialised DDoS protection

Defending against IoT-driven DDoS attacks is a constant battle. By staying informed, investing in protection, and fostering collaboration, we can create a safer digital world. ๐Ÿ’ช๐ŸŒ

 

Join Discord

 

I came across ZZZ money club during the crypto market bull run when everyoneโ€™s a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.

The group is very active and everyone in this private discord group is very chatty and helpful.

Its run by Yourfriendandy and Decadeinvestor, you can find them here on YouTube, both top guys with great content.

If you are interested in joining the group you can through the link below.

It sees you when you’re sleeping

It knows when you’re awake

Doesnโ€™t care if you’ve opted in or out

So PAY UP for Google sake ๐Ÿ‘€๐Ÿ’€๐Ÿ™ˆ

 

giphy.com

 

๐Ÿ” Google to Pay $93 Million in Location-Privacy Lawsuit Settlement ๐Ÿ“

Google is settling a lawsuit with California for $93 million, addressing allegations of misleading location-privacy practices and violations of consumer protection laws. ๐Ÿ˜ฎ

๐ŸŒ California Attorney General Rob Bonta revealed that Google promised users it would stop tracking their location when they opted out but continued to do so for commercial purposes. The company was accused of collecting location data through other means and deceiving users about their ability to opt out of location-based ads. ๐Ÿ˜ก

๐Ÿ’ฐ Google’s revenue topped $220 billion in 2022, largely from advertising. This settlement follows previous ones with 40 U.S. states ($391.5 million), Indiana, Washington, D.C. ($29.5 million), and Washington state ($39.9 million) for similar location-tracking issues. Texas has an ongoing lawsuit. ๐Ÿค‘

๐Ÿ“œ Google, while not admitting wrongdoing, cited outdated policies and pledged greater user control and transparency over location data. ๐Ÿ”„ Excuses, excuses, eh?

๐Ÿš€ In related news, Google-owned Fitbit faces privacy complaints from Austrian non-profit NOYB for compelling new app users to consent to data transfers outside the EU. NOYB alleges users can’t easily withdraw consent without deleting their accounts. ๐Ÿ™…โ€โ™‚๏ธ๐Ÿ’”

๐Ÿ—ž๏ธ Extra, Extra! Read all about it!

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ’Šย HealthHack:ย Tech is making it easier than ever to reach your fitness goals, from wearable devices to nutrition apps, this newsletter does the research for you, get all the latest health tech gadgets delivered to your inbox.

  • โ‚ฟ Crypto Nutshell: A well written and beautifully designed newsletter giving you the lowdown on crypto and web3, highly recommend if interested to get up to date info on the crypto/web3 market.

  • ๐Ÿง ย Big Brain: Trending AI news, jobs and tools delivered in 3 minutes per day.

Let us know what you think!

If you donโ€™t Node me by now,

You will never, never, never Node me ๐Ÿ˜‚

 

makeagif.com

 

๐ŸŒ Facebook Business Accounts Targeted in NodeStealer Campaign ๐ŸŽฏ

A persistent campaign is aiming at Facebook Business accounts, tricking victims with deceptive messages to harvest their credentials. This attack employs a Python-based variant of NodeStealer, with the potential to seize control of accounts for further malicious activities. ๐Ÿ˜ฑ

๐ŸŽฏ Campaign Scope and Origins ๐ŸŒ

Mainly impacting Southern Europe and North America, this campaign targets various sectors, especially manufacturing services and technology. NodeStealer, initially discovered by Meta in May 2023, started as a JavaScript malware stealing cookies and passwords to compromise Facebook, Gmail, and Outlook accounts.

๐Ÿ Python Version Emerges ๐Ÿ

Palo Alto Networks Unit 42 disclosed an attack wave in December 2022 that used a Python version of NodeStealer, including versions with cryptocurrency theft capabilities.

๐Ÿ•ต๏ธ Vietnamese Threat Actors Suspected ๐Ÿ•ต๏ธ

Netskope suggests that Vietnamese threat actors may be behind these attacks, possibly adopting tactics used by other adversaries from the same country with similar objectives.

๐Ÿ’Œ Messenger-Based Attack Vector ๐Ÿ’Œ

Fraudulent messages via Facebook Messenger are also being used to distribute the NodeStealer malware. These messages deliver ZIP or RAR archive files, baiting users with images of defective products to convince them to download the malware payload.

๐Ÿ“ฅ Malware Delivery and Execution ๐Ÿ“ฅ

When victims execute the malware, it opens the Chrome web browser and secretly runs a PowerShell command to retrieve additional payloads, including the Python interpreter and NodeStealer malware. This versatile malware captures credentials, cookies, and system metadata, which it exfiltrates over Telegram.

๐Ÿ” The Danger and Future Threats ๐Ÿ”

This campaign could lead to more targeted attacks since attackers gather valuable information. Stolen Facebook credentials could enable fraudulent transactions through legitimate business pages. Vigilance is crucial to stay protected! ๐Ÿ’ช๐Ÿ›ก๏ธ

So long and thanks for reading all the phish!

Recent articles