CCTV Botnets Make DDoS Attacks


CCTV Botnets Make DDoS Attacks

Posted on .

CCTV Botnets Make DDoS Attacks


This article was posted on Thursday, 16:29, UTC.

Recent reports showed that attackers are leveraging the vulnerability of CCTV for distributed denial-of-service (DDoS) attacks.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

Octave Klaba, founder and CTO of OVH, reported via his Twitter account that for days, OVH became victim to multiple DDoS attacks.

“Last days, we got lot of huge DDoS. Here, the list of “bigger that 100Gbps” only. You can see the simultaneous DDoS are close to 1Tbps!” the founder and CTO of OVH tweeted.

According to Klaba, the DDoS attackers used an internet of things (IoT) botnet with 145,607 compromised CCTV security cameras.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

“This botnet with 145607 cameras/dvr (1-30Mbps per IP) is able to send >1.5Tbps DDoS,” the CTO of OVH tweeted.

Klaba, who reported the breach on September 22 to 23 this year, said that the severest single attack reached 93 MMps and 799 Gbps.

The attack on OVH is the largest known DDoS offensive, according to Pierluigi Paganini of Security Affairs.

Two days before the DDoS attack on OVH, cybercrime journalist Brian Krebs reported that his website came under DDoS attack. During the attack, the traffic on KrebsOnSecurity reached 620 Gbps in size.

“There are some indications that this attack was launched with the help of a botnet that has enslaved a large number of hacked so-called “Internet of Things,” (IoT) devices — routers, IP cameras and digital video recorders (DVRs) that are exposed to the Internet and protected with weak or hard-coded passwords,” Krebs wrote on his website.

Both OVH and survived the DDoS attacks.

In June this year, cyber security company Sucuri reported that one of its clients, a small brick and mortar jewelry shop, came under DDoS attack for days.

The DDoS attack on the jewelry shop peaked to almost 50,000 HTTP requests per second. Only a few servers can handle 50,000 plus requests per second, according to Sucuri.

When security experts at Sucuri delved into the problem, they found that the DDoS attack utilized 25,000 CCTV security cameras around the world.

Out of the 25,000 CCTVs, according to Sucuri, 75% have IP address from Taiwan, USA, Indonesia, Mexico, Malaysia, Israel, Italy, Vietnam, France and Spain; while 25% were scattered in another 95 countries.

Why Attackers Choose CCTVs

In a blog post entitled “Attack of Things” published on Level 3 Communication website, researchers at Level 3 Threat Research Labs said that CCTV or security camera DVRs are currently favored by DDoS attackers.

Researchers at Level 3 Threat Research Labs wrote:

These devices often come configured with telnet and web interfaces enabled, allowing users to configure the devices and view their security footage over the internet. Unfortunately, many are left configured with default credentials, making them low-hanging fruit for bot herders. Most of these devices run some flavor of embedded Linux. When combined with the bandwidth required to stream video, they provide a potent class of DDoS bots.

Based on the 2015 “Worldwide Infrastructure Security Report,” researchers from Arbor Networks, the cyber security division of NETSCOUT, reported that the largest attack reported by a respondent in 2015 was 500 Gbps.

According to Arbor Networks, DDoS attacks against users remain the most common cybersecurity threat. Two-thirds of the respondents of the Arbor Networks’ report estimate that the cost of internet downtime was per minute.

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.

Feedback or Requests?

Ellen Red

Ellen Red

There are no comments.

View Comments (0) ...
The team:
Dmitriy Lavrov
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Jonas Borchgrevink is the founder of and He is a serial entrepreneur, trader and investor. He shares his own personal journey on // -- Discuss and ask Read More
Mate Csar
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Mati Greenspan
Senior Market Analyst at // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Important: Never invest Read More
Rakesh Upadhyay
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Read More
Joseph Young
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More
The White House released a report titled "Preparing for the…