Browsing tag

IoT Devices

Amazon’s Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password

Security researchers at Bitdefender have discovered a high-severity security vulnerability in Amazon’s Ring Video Doorbell Pro devices that could allow nearby attackers to steal your WiFi password and launch a variety of cyberattacks using MitM against other devices connected to the same network. In case you don’t own one of these, Amazon’s Ring Video Doorbell […]

D-Link agrees to Security Assessment to Settle FTC lawsuit

D-Link has agreed to make some security enhancements that have reorganized the company’s security platform to resolve disputes from the Federal Trade Commission (FTC) because it has misinterpreted the security of its product. The case stems from complaints from corporate routers and IoT cameras against D-Link in 2017 that disclosed confidential consumer information to third […]

This Malware Created By A 14-Yr-Old Is Bricking Thousands Of Devices

A new malware called Silex is on its way to brick thousands of IoT devices. The malware has been developed by a 14-year old teenager known by the pseudonym Light Leafon. The malware strain is inspired by the infamous malware called BrickerBot, which is notorious for bricking millions of IoT devices way back in 2017. […]

Emotet Trojan Now Uses IoT And Router Devices To Evade Detection

The Emotet malware has been frequently covered here in Hackercombat since July last year. It is not uncommon for a cyber security-centered website to discuss most if not all of its infection instances since it is a very complex banking trojan which continues to receive enhancements from its authors. This time around, we will cover […]

Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable

If you own a smart home, then you may probably be aware of Belkin Wemo Insight smart plug. Yes, it helps you to turn off your lights and appliances, and you can also monitor them from anywhere. We are trying to highlight how the plug has been vulnerable for over a year, and a fix […]

Printer Vulnerabilities Report Reveals Cybersecurity Risk

Quocirca, a market insight consulting firm has posted their Global Print Security Landscape 2019 report, which publicly revealed that 60% of corporate entities globally are exposed to data breach due to misconfigured printers. The reality that printers are not a set it, then forget it machines, but rather a machine with its own operating system […]

Cyber Warfare – How to Keep Your Consumer Devices Safe

According to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is likely to see an increase of state actors taking aim at the private sector in foreign companies, continuing an ongoing trend over the past several years. The report published quotes about economically-motivated attacks, aimed at “stealing […]

New Botnet That Targets Cloud Servers for DDoS Attacks

Bad news for those who use Hadoop for data analytics…there’s a new botnet out there that’s targeting Hadoop clusters seeking to perform DDoS attacks. (Hadoop, which is an open source distributed processing framework, allows for the distributed processing of large data sets across clusters of computers using simple programming models). The new, unsophisticated Linux-based botnet […]

Cryptocurrency-Mining Botnet Attack SSH Service Running IoT Devices

Newly discovered cryptocurrency mining bot targeting the Internet of Things (IoT) devices which contain SSH service and  IoT-related ports, including 22, 2222, and 502. Cryptocurrency-mining malware consumes the system resources and utilizes them for mining cryptocurrencies without user permissions. This crypto-mining attack will work for all the connected devices and servers that running under SSH […]

DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits

IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete control of the targeting network systems. IoT based cyber Attacks are blooming since the number IoT devices are increasing rapidly and attackers always find the many ways to bypass it. In this case, Doubledoor Botnet […]

Paskto – Passive Web Scanner

Paskto will passively scan the web using the Common Crawl internet index either by downloading the indexes on request or parsing data from your local system. URLs are then processed through Nikto and known URL lists to identify interesting content. Hash signatures are also used to identify known default content for some IoT devices or […]

It Still Takes 2 Minutes to Have Vulnerable IoT Devices Compromised Online

Almost a year after the emergence of the Mirai botnet, smart devices are still facing a barrage of credential attacks, and a device left connected to the Internet with default credentials will be hijacked in about two minutes. This is the result of a recent experiment carried out by Johannes B. Ullrich, a member of the SANS […]

Cheeze!Hackers Can Easily Access Your Samsung SmartCam Security Cameras

It is not important to interrupt into your computer or telephone to secret agent on you. nowadays all gadgets in our domestic are becoming greater linked to networks than ever to make our lives clean. But what is worrisome is that these connected devices may be became in opposition to us, every time, due to […]