Hackers exploit the vulnerabilities of printers and photocopiers 35 years ago



[ad_1]

Computer security firm Kaspersky Lab released its report on botnet-assisted DDoS denial of service attacks for the second quarter of 2018. Among the researchers' findings, one in particular attracted attention, where the hackers they used vulnerabilities of several decades to implement DDoS attacks.

The report shows that in the past three months, hackers have used botnets connected to video cameras, photocopiers and printers.

Kaspersky claims that in the second quarter of this year, hackers used botnets for DDoS attacks in 74 countries, with China and the United States being the main sites, with North Korea taking the fourth square. In the case of Hong Kong, the third most attacked, hackers targeted cloud storage and hosting services.

In the period analyzed, hackers used very old vulnerabilities. For example, it could be known as DDoS attacks that depend on a vulnerability in the Universal Plug and Play protocol, known since 2001, and also a vulnerability in the CHARGEN protocol, which was discovered in 1983.

of the limited use of this service, there are still many CHARGEN servers on the Internet, and almost all are printers and photocopiers. However, the fact that hackers master the old techniques does not mean that their botnets are not solid. In fact, nearly 50,000 surveillance cameras were used in Japan for DDoS attacks

The report mentions Verge (XVG) as the cryptocurrency most used to monetize its actions, claiming that gaming platforms remain its main focus, especially the skills of eSport. In this sense, the company reveals that this type of attacks can affect the full functionality of the game, including the total elimination of competition.

[ad_2]
Source link