<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Webcams involved in Dyn DDoS attack recalled &#124; TechCrunch</title>
	<atom:link href="http://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520811</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 11:17:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520811</guid>
		<description><![CDATA[Botnet Recall of Things
http://hackaday.com/2016/10/26/botnet-recall-of-things/

After a tough summer of botnet attacks by Internet-of-Things things came to a head last week and took down many popular websites for folks in the eastern US, more attention has finally been paid to what to do about this mess. We’ve wracked our brains, and the best we can come up with is that it’s the manufacturers’ responsibility to secure their devices.

Chinese DVR manufacturer Xiongmai, predictably, thinks that the end-user is to blame, but is also consenting to a recall of up to 300 million of their pre-2015 vintage cameras — the ones with hard-coded factory default passwords. 

Xiongmai’s claim is that their devices were never meant to be exposed to the real Internet, but rather were designed to be used exclusively behind firewalls. That’s apparently the reason for the firmware-coded administrator passwords. (Sigh!) Anyone actually making their Internet of Things thing reachable from the broader network is, according to Xiongmai, being irresponsible. They then go on to accuse a tech website of slander, and produce a friendly ruling from a local court supporting this claim.

Whatever. We understand that Xiongmai has to protect its business, and doesn’t want to admit liability. And in the end, they’re doing the right thing by recalling their devices with hard-coded passwords
]]></description>
		<content:encoded><![CDATA[<p>Botnet Recall of Things<br />
<a href="http://hackaday.com/2016/10/26/botnet-recall-of-things/" rel="nofollow">http://hackaday.com/2016/10/26/botnet-recall-of-things/</a></p>
<p>After a tough summer of botnet attacks by Internet-of-Things things came to a head last week and took down many popular websites for folks in the eastern US, more attention has finally been paid to what to do about this mess. We’ve wracked our brains, and the best we can come up with is that it’s the manufacturers’ responsibility to secure their devices.</p>
<p>Chinese DVR manufacturer Xiongmai, predictably, thinks that the end-user is to blame, but is also consenting to a recall of up to 300 million of their pre-2015 vintage cameras — the ones with hard-coded factory default passwords. </p>
<p>Xiongmai’s claim is that their devices were never meant to be exposed to the real Internet, but rather were designed to be used exclusively behind firewalls. That’s apparently the reason for the firmware-coded administrator passwords. (Sigh!) Anyone actually making their Internet of Things thing reachable from the broader network is, according to Xiongmai, being irresponsible. They then go on to accuse a tech website of slander, and produce a friendly ruling from a local court supporting this claim.</p>
<p>Whatever. We understand that Xiongmai has to protect its business, and doesn’t want to admit liability. And in the end, they’re doing the right thing by recalling their devices with hard-coded passwords</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520772</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:54:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520772</guid>
		<description><![CDATA[Beijing threatens legal action over webcam claims
http://www.bbc.com/news/technology-37761868

The Chinese Ministry of Justice has threatened legal action against &quot;organisations and individuals&quot; making &quot;false claims&quot; about the security of Chinese-made devices.

It follows a product recall from the Chinese electronics firm Hangzhou after its web cameras were used in a massive web attack last week.

The attack knocked out sites such as Reddit, Twitter, Paypal and Spotify.

The Chinese government blamed customers for not changing their passwords.

Its legal warning was added to an online statement from the company Xiongmai, in which the firm said that it would recall products, mainly webcams, following the attack but denied that its devices made up the majority of the botnet used to launch it.

The cyber attack hit Dyn, a firm which matches IP addresses to web addresses to allow users to find sites online, on 21 October.

Afterwards, it became clear that it was made possible via a botnet made up of insecure &quot;smart&quot; devices, which had been taken over remotely and enlisted to bombard Dyn with data, knocking offline the sites it manages.

Krebs pointed out that it was difficult for users to change the default passwords on devices.

&quot;Products from Xiongmai and other makers of inexpensive, mass-produced &#039;internet of things&#039; devices are essentially unfixable,&quot; he said, &quot;and will remain a danger to others unless and until they are completely unplugged from the internet.&quot;

Video surveillance equipment expert Brian Karas said he did not believe the Chinese government would follow through on its legal threats.

&quot;We believe Xiongmai has issued this announcement as a PR effort within China, to help counter criticisms they are facing,&quot; he said.]]></description>
		<content:encoded><![CDATA[<p>Beijing threatens legal action over webcam claims<br />
<a href="http://www.bbc.com/news/technology-37761868" rel="nofollow">http://www.bbc.com/news/technology-37761868</a></p>
<p>The Chinese Ministry of Justice has threatened legal action against &#8220;organisations and individuals&#8221; making &#8220;false claims&#8221; about the security of Chinese-made devices.</p>
<p>It follows a product recall from the Chinese electronics firm Hangzhou after its web cameras were used in a massive web attack last week.</p>
<p>The attack knocked out sites such as Reddit, Twitter, Paypal and Spotify.</p>
<p>The Chinese government blamed customers for not changing their passwords.</p>
<p>Its legal warning was added to an online statement from the company Xiongmai, in which the firm said that it would recall products, mainly webcams, following the attack but denied that its devices made up the majority of the botnet used to launch it.</p>
<p>The cyber attack hit Dyn, a firm which matches IP addresses to web addresses to allow users to find sites online, on 21 October.</p>
<p>Afterwards, it became clear that it was made possible via a botnet made up of insecure &#8220;smart&#8221; devices, which had been taken over remotely and enlisted to bombard Dyn with data, knocking offline the sites it manages.</p>
<p>Krebs pointed out that it was difficult for users to change the default passwords on devices.</p>
<p>&#8220;Products from Xiongmai and other makers of inexpensive, mass-produced &#8216;internet of things&#8217; devices are essentially unfixable,&#8221; he said, &#8220;and will remain a danger to others unless and until they are completely unplugged from the internet.&#8221;</p>
<p>Video surveillance equipment expert Brian Karas said he did not believe the Chinese government would follow through on its legal threats.</p>
<p>&#8220;We believe Xiongmai has issued this announcement as a PR effort within China, to help counter criticisms they are facing,&#8221; he said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520766</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:45:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520766</guid>
		<description><![CDATA[China&#039;s Xiongmai to recall up to 10,000 webcams after hack
http://www.reuters.com/article/us-cyber-attacks-china-idUSKCN12P1TT

Up to 10,000 webcams will be recalled in the aftermath of a cyber attack that blocked access last week to some of the world&#039;s biggest websites, Chinese manufacturer Hangzhou Xiongmai Technology Co told Reuters on Tuesday.

In Washington, a member of the U.S. Senate Intelligence committee asked three federal agencies what steps the government can take to prevent cyber criminals from compromising electronic devices.

In a new type of attack last Friday, hackers harnessed hundreds of thousands of webcams and other connected devices globally to flood U.S.-based internet infrastructure provider Dyn with so much traffic that it could not cope, cutting access to websites including PayPal, Spotify and Twitter.

Hangzhou Xiongmai said it would recall some surveillance cameras sold in the United States after researchers identified they had been targeted in the attack.]]></description>
		<content:encoded><![CDATA[<p>China&#8217;s Xiongmai to recall up to 10,000 webcams after hack<br />
<a href="http://www.reuters.com/article/us-cyber-attacks-china-idUSKCN12P1TT" rel="nofollow">http://www.reuters.com/article/us-cyber-attacks-china-idUSKCN12P1TT</a></p>
<p>Up to 10,000 webcams will be recalled in the aftermath of a cyber attack that blocked access last week to some of the world&#8217;s biggest websites, Chinese manufacturer Hangzhou Xiongmai Technology Co told Reuters on Tuesday.</p>
<p>In Washington, a member of the U.S. Senate Intelligence committee asked three federal agencies what steps the government can take to prevent cyber criminals from compromising electronic devices.</p>
<p>In a new type of attack last Friday, hackers harnessed hundreds of thousands of webcams and other connected devices globally to flood U.S.-based internet infrastructure provider Dyn with so much traffic that it could not cope, cutting access to websites including PayPal, Spotify and Twitter.</p>
<p>Hangzhou Xiongmai said it would recall some surveillance cameras sold in the United States after researchers identified they had been targeted in the attack.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520750</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:22:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520750</guid>
		<description><![CDATA[Map shows which state have more unprotected cams
https://www.hackread.com/firm-recall-webcams-after-dyn-ddos-attack/

Remember, it was the Mirai botnet that played a vital role in the DDoS attack on Dyn servers. The fact that Mirai’s developer leaked its source code online also played a vital role in the rapid increase of this botnet. Last month, the same botnet was used for conducting the Internets largest ever DDoS attack of 1 Tbps on OVH hostings as well as the 665 Gbps attack on Brian Krebs blog by hacking over 145,000 webcams.

If you own a security camera or any IoT device HackRead urges you to change their default login credentials now to avoid getting your device compromised and used in further DDoS attacks.]]></description>
		<content:encoded><![CDATA[<p>Map shows which state have more unprotected cams<br />
<a href="https://www.hackread.com/firm-recall-webcams-after-dyn-ddos-attack/" rel="nofollow">https://www.hackread.com/firm-recall-webcams-after-dyn-ddos-attack/</a></p>
<p>Remember, it was the Mirai botnet that played a vital role in the DDoS attack on Dyn servers. The fact that Mirai’s developer leaked its source code online also played a vital role in the rapid increase of this botnet. Last month, the same botnet was used for conducting the Internets largest ever DDoS attack of 1 Tbps on OVH hostings as well as the 665 Gbps attack on Brian Krebs blog by hacking over 145,000 webcams.</p>
<p>If you own a security camera or any IoT device HackRead urges you to change their default login credentials now to avoid getting your device compromised and used in further DDoS attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520746</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:20:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520746</guid>
		<description><![CDATA[Chinese Company Recalls Cameras, DVRs Used In Last Week&#039;s Massive DDoS Attack
https://www.techdirt.com/articles/20161024/08552535872/chinese-company-recalls-cameras-dvrs-used-last-weeks-massive-ddos-attack.shtml

For some time now, security researchers have been warning that our lackadaisical approach to Internet of Things security would soon be coming home to roost. Initially it was kind of funny to read how &quot;smart&quot; fridges, tea kettles and Barbie dolls did an arguably worse job than their dumb counterparts with a greater risk to privacy and security. But as we collectively realized that these devices not only created millions of new home and business attack vectors, but could also be used to wage historically-unprecedented DDoS attacks, things quickly became less amusing. 

Last week, the theoretical became very real with the massive attack on DNS provider DYN, which knocked a swath of companies and services off the internet for a large portion of Friday.

 Mirai botnet malware recently released to make compromising and harnessing such devices easier than ever. But the group also notes that targeted devices included everything from cameras to... your cable DVR

Brian Krebs notes that the lion&#039;s share of these devices were manufactured by a Chinese company named XiongMai Technologies, which almost instantly found a huge swath of its product line contributing to the attack

For what it&#039;s worth, XiongMai was quick to issue a statement announcing that it would be recalling some of its products (mostly webcams), while strengthening password functions (Mirai often depends on default usernames and passwords) and sending users a patch for products made before April of last year.

And while that&#039;s all well and good, that&#039;s just one company. There are dozens upon dozens of companies and &quot;IoT evangelists&quot; that refuse to acknowledge that they put hype and personal profit ahead of security, by proxy putting the entire internet at risk. Not only do most of these devices lack even the most fundamental security, they usually provide no functionality to help users determine if they&#039;re generating traffic or participating in attacks. And these devices are often sitting behind consumer-grade routers on the network that have equally flimsy security while using default username and password combinations.]]></description>
		<content:encoded><![CDATA[<p>Chinese Company Recalls Cameras, DVRs Used In Last Week&#8217;s Massive DDoS Attack<br />
<a href="https://www.techdirt.com/articles/20161024/08552535872/chinese-company-recalls-cameras-dvrs-used-last-weeks-massive-ddos-attack.shtml" rel="nofollow">https://www.techdirt.com/articles/20161024/08552535872/chinese-company-recalls-cameras-dvrs-used-last-weeks-massive-ddos-attack.shtml</a></p>
<p>For some time now, security researchers have been warning that our lackadaisical approach to Internet of Things security would soon be coming home to roost. Initially it was kind of funny to read how &#8220;smart&#8221; fridges, tea kettles and Barbie dolls did an arguably worse job than their dumb counterparts with a greater risk to privacy and security. But as we collectively realized that these devices not only created millions of new home and business attack vectors, but could also be used to wage historically-unprecedented DDoS attacks, things quickly became less amusing. </p>
<p>Last week, the theoretical became very real with the massive attack on DNS provider DYN, which knocked a swath of companies and services off the internet for a large portion of Friday.</p>
<p> Mirai botnet malware recently released to make compromising and harnessing such devices easier than ever. But the group also notes that targeted devices included everything from cameras to&#8230; your cable DVR</p>
<p>Brian Krebs notes that the lion&#8217;s share of these devices were manufactured by a Chinese company named XiongMai Technologies, which almost instantly found a huge swath of its product line contributing to the attack</p>
<p>For what it&#8217;s worth, XiongMai was quick to issue a statement announcing that it would be recalling some of its products (mostly webcams), while strengthening password functions (Mirai often depends on default usernames and passwords) and sending users a patch for products made before April of last year.</p>
<p>And while that&#8217;s all well and good, that&#8217;s just one company. There are dozens upon dozens of companies and &#8220;IoT evangelists&#8221; that refuse to acknowledge that they put hype and personal profit ahead of security, by proxy putting the entire internet at risk. Not only do most of these devices lack even the most fundamental security, they usually provide no functionality to help users determine if they&#8217;re generating traffic or participating in attacks. And these devices are often sitting behind consumer-grade routers on the network that have equally flimsy security while using default username and password combinations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520743</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:17:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520743</guid>
		<description><![CDATA[Chinese tech giant recalls webcams used in Dyn cyberattack
http://www.zdnet.com/article/chinese-tech-giant-recalls-webcams-used-in-dyn-cyberattack/

A number of the company&#039;s US-sold products were used in the attack, which prevented millions of users from accessing dozens of high-profile websites.

A Chinese manufacturer of internet-connected surveillance cameras has recalled a number of its products said to have been used in Friday&#039;s cyberattack.

The three-wave attack against Dyn, a managed domain name system provider, lasted almost all day, leaving millions on the US east coast unable to access dozens of high-profile websites. 

In a statement, Xiongmai said hackers were able to hijack hundreds of thousands of its devices into a botnet because users had not changed the devices&#039; default passwords.

The botnet then flooded Dyn&#039;s servers with traffic, which led to its systems overloading and failing. Websites that relied on Dyn&#039;s managed domain name system, including Reddit, Spotify, and Twitter, appeared offline.

But the company rejected claims that its devices made up the bulk of the attack.

&quot;Security issues are a problem facing all mankind,&quot; the statement said. &quot;Since industry giants have experienced them, Xiongmai is not afraid to experience them once, too.&quot;

The company confirmed that it will recall some of its older products sold in the US made before April 2015 in an effort to improve its password functionality.]]></description>
		<content:encoded><![CDATA[<p>Chinese tech giant recalls webcams used in Dyn cyberattack<br />
<a href="http://www.zdnet.com/article/chinese-tech-giant-recalls-webcams-used-in-dyn-cyberattack/" rel="nofollow">http://www.zdnet.com/article/chinese-tech-giant-recalls-webcams-used-in-dyn-cyberattack/</a></p>
<p>A number of the company&#8217;s US-sold products were used in the attack, which prevented millions of users from accessing dozens of high-profile websites.</p>
<p>A Chinese manufacturer of internet-connected surveillance cameras has recalled a number of its products said to have been used in Friday&#8217;s cyberattack.</p>
<p>The three-wave attack against Dyn, a managed domain name system provider, lasted almost all day, leaving millions on the US east coast unable to access dozens of high-profile websites. </p>
<p>In a statement, Xiongmai said hackers were able to hijack hundreds of thousands of its devices into a botnet because users had not changed the devices&#8217; default passwords.</p>
<p>The botnet then flooded Dyn&#8217;s servers with traffic, which led to its systems overloading and failing. Websites that relied on Dyn&#8217;s managed domain name system, including Reddit, Spotify, and Twitter, appeared offline.</p>
<p>But the company rejected claims that its devices made up the bulk of the attack.</p>
<p>&#8220;Security issues are a problem facing all mankind,&#8221; the statement said. &#8220;Since industry giants have experienced them, Xiongmai is not afraid to experience them once, too.&#8221;</p>
<p>The company confirmed that it will recall some of its older products sold in the US made before April 2015 in an effort to improve its password functionality.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520738</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:08:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520738</guid>
		<description><![CDATA[Device Makers Face Legal Trouble Over Internet of Things Attack
http://fortune.com/2016/10/25/dyn-lawsuits/

The legal test looks at consumer harms.

Who should be held responsible for last week’s security breach that took out parts of the Internet?

That question is becoming more pressing as regulators and the public begin to grasp the implication of the first major “Internet of things” attack, in which hackers hijacked millions of everyday devices such as security cameras and printers, and cut off access to major websites like Amazon and Twitter for hours at a time.

Increasingly, the security community is focusing on the role of the device makers, whose products contained a major security flaw. Namely, the companies did not require consumers to change a default password, which is what made it so easy for hackers to conscript so many Internet-connected devices into the botnet army that carried out last week’s attack.

Some of the companies, which include little-known Chinese manufacturers but also familiar names like Panasonic and Xerox, have begun a recall of the devices. But for now, many of their products remain out in the wild with their software “unpatched.” That means they remain compromised. Worse, hackers have released the source code to control the botnet army, meaning future attacks using devices of this nature are all but certain.

This raises the question of whether the device makers should be held legally responsible. Even though they had no role in directing last week’s attack on the Internet, such an attack was not hard to foresee—especially since there have been reports of compromised cameras, and other Internet-enabled devices, for years.

According to Michael Zweiback, an attorney with Alston &amp; Bird and a former cyber-crime prosecutor, legal action is most likely to come in the form of lawsuits, and investigations by the Federal Trade Commission and state attorneys general.

A harder question is whether U.S. consumers who purchased the compromised devices, which also include network routers and baby monitors, can bring lawsuits of their own.

While class action lawyers may be watching the situation closely, a legal victory would be no sure thing. Even though the companies appear to have been negligent by failing to introduce tougher password protection, consumers would still have to show they were harmed. And right now the test for showing harm is unclear.

The situation is different for Dyn, the Internet service company that was the direct target of last week’s attack by the millions of compromised devices, since the firm had to directly absorb the cost of the attack.]]></description>
		<content:encoded><![CDATA[<p>Device Makers Face Legal Trouble Over Internet of Things Attack<br />
<a href="http://fortune.com/2016/10/25/dyn-lawsuits/" rel="nofollow">http://fortune.com/2016/10/25/dyn-lawsuits/</a></p>
<p>The legal test looks at consumer harms.</p>
<p>Who should be held responsible for last week’s security breach that took out parts of the Internet?</p>
<p>That question is becoming more pressing as regulators and the public begin to grasp the implication of the first major “Internet of things” attack, in which hackers hijacked millions of everyday devices such as security cameras and printers, and cut off access to major websites like Amazon and Twitter for hours at a time.</p>
<p>Increasingly, the security community is focusing on the role of the device makers, whose products contained a major security flaw. Namely, the companies did not require consumers to change a default password, which is what made it so easy for hackers to conscript so many Internet-connected devices into the botnet army that carried out last week’s attack.</p>
<p>Some of the companies, which include little-known Chinese manufacturers but also familiar names like Panasonic and Xerox, have begun a recall of the devices. But for now, many of their products remain out in the wild with their software “unpatched.” That means they remain compromised. Worse, hackers have released the source code to control the botnet army, meaning future attacks using devices of this nature are all but certain.</p>
<p>This raises the question of whether the device makers should be held legally responsible. Even though they had no role in directing last week’s attack on the Internet, such an attack was not hard to foresee—especially since there have been reports of compromised cameras, and other Internet-enabled devices, for years.</p>
<p>According to Michael Zweiback, an attorney with Alston &amp; Bird and a former cyber-crime prosecutor, legal action is most likely to come in the form of lawsuits, and investigations by the Federal Trade Commission and state attorneys general.</p>
<p>A harder question is whether U.S. consumers who purchased the compromised devices, which also include network routers and baby monitors, can bring lawsuits of their own.</p>
<p>While class action lawyers may be watching the situation closely, a legal victory would be no sure thing. Even though the companies appear to have been negligent by failing to introduce tougher password protection, consumers would still have to show they were harmed. And right now the test for showing harm is unclear.</p>
<p>The situation is different for Dyn, the Internet service company that was the direct target of last week’s attack by the millions of compromised devices, since the firm had to directly absorb the cost of the attack.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520736</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:05:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520736</guid>
		<description><![CDATA[Chinese Company Recalls Millions of IoT Devices After DYN Attack
https://www.tripwire.com/state-of-security/latest-security-news/chinese-company-recalls-millions-iot-devices-dyn-attack/

A Chinese technology company has recalled millions of Internet of Things (IoT) devices following a digital attack against the Internet performance management company DYN.

As quoted by KrebsonSecurity.com, Dyn had this to say:

Flashpoint told Brian Krebs that a specific set of credentials scanned for by Mirai bots – username: root and password: xc3511 – is hardcoded into the device firmware of a number of IoT devices produced by a a Chinese company called XiongMai Technologies, meaning someone can’t change an affected device’s username or password via a web admin panel.

Perhaps in recognition of that fact, XiongMai Technologies issued a recall of millions of its network cameras and other devices on 24 October.

In a statement, the Chinese company says three conditions must all be met for hackers to obtain access to the products:

    The devices must predate April 2015 when XiongMai Technologies instituted a new firmware upgrade program.
    The default login credentials must still be activated on those products.
    A public network must directly expose itself to the devices without the use of a firewall.

XiongMai Technologies says hackers can’t abuse its products absent any one of those criteria.


IoT Device Maker Vows Product Recall, Legal Action Against Western Accusers
https://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/

A Chinese electronics firm pegged by experts as responsible for making many of the components leveraged in last week’s massive attack that disrupted Twitter and dozens of popular Web sites has vowed to recall some of its vulnerable products, even as it threatened legal action against this publication and others for allegedly tarnishing the company’s brand.

Last week’s attack on online infrastructure provider Dyn was launched at least in part by Mirai, a now open-source malware strain that scans the Internet for routers, cameras, digital video recorders and other Internet of Things “IoT” devices protected only by the factory-default passwords. Once infected with Mirai, the IoT systems can be used to flood a target with so much junk Web traffic that the target site can no longer accommodate legitimate users or visitors.

In an interim report on the attack, Dyn said: “We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.”

default passwords sought by machines infected with Mirai — username: root and password: xc3511 — is embedded in a broad array of white-labeled DVR and IP camera electronics boards made by a Chinese company called XiongMai Technologies. These components are sold downstream to vendors who then use them in their own products.

The scary part about IoT products that include XiongMai’s various electronics components, Flashpoint found, was that while users could change the default credentials in the devices’ Web-based administration panel, the password is hardcoded into the device firmware and the tools needed to disable it aren’t present.

In a statement issued on social media Monday, XiongMai (referring to itself as “XM”) said it would be issuing a recall on millions of devices — mainly network cameras.

Brian Karas, a business analyst with IPVM — a subscription-based news, testing and training site for the video surveillance industry which first reported the news of potential litigation by XM — said that over the past five years China’s market share in the video surveillance industry has surged, due to the efforts of companies like XiongMai and Dahua to expand globally, and from the growth of government-controlled security company Hikvision.]]></description>
		<content:encoded><![CDATA[<p>Chinese Company Recalls Millions of IoT Devices After DYN Attack<br />
<a href="https://www.tripwire.com/state-of-security/latest-security-news/chinese-company-recalls-millions-iot-devices-dyn-attack/" rel="nofollow">https://www.tripwire.com/state-of-security/latest-security-news/chinese-company-recalls-millions-iot-devices-dyn-attack/</a></p>
<p>A Chinese technology company has recalled millions of Internet of Things (IoT) devices following a digital attack against the Internet performance management company DYN.</p>
<p>As quoted by KrebsonSecurity.com, Dyn had this to say:</p>
<p>Flashpoint told Brian Krebs that a specific set of credentials scanned for by Mirai bots – username: root and password: xc3511 – is hardcoded into the device firmware of a number of IoT devices produced by a a Chinese company called XiongMai Technologies, meaning someone can’t change an affected device’s username or password via a web admin panel.</p>
<p>Perhaps in recognition of that fact, XiongMai Technologies issued a recall of millions of its network cameras and other devices on 24 October.</p>
<p>In a statement, the Chinese company says three conditions must all be met for hackers to obtain access to the products:</p>
<p>    The devices must predate April 2015 when XiongMai Technologies instituted a new firmware upgrade program.<br />
    The default login credentials must still be activated on those products.<br />
    A public network must directly expose itself to the devices without the use of a firewall.</p>
<p>XiongMai Technologies says hackers can’t abuse its products absent any one of those criteria.</p>
<p>IoT Device Maker Vows Product Recall, Legal Action Against Western Accusers<br />
<a href="https://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/" rel="nofollow">https://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/</a></p>
<p>A Chinese electronics firm pegged by experts as responsible for making many of the components leveraged in last week’s massive attack that disrupted Twitter and dozens of popular Web sites has vowed to recall some of its vulnerable products, even as it threatened legal action against this publication and others for allegedly tarnishing the company’s brand.</p>
<p>Last week’s attack on online infrastructure provider Dyn was launched at least in part by Mirai, a now open-source malware strain that scans the Internet for routers, cameras, digital video recorders and other Internet of Things “IoT” devices protected only by the factory-default passwords. Once infected with Mirai, the IoT systems can be used to flood a target with so much junk Web traffic that the target site can no longer accommodate legitimate users or visitors.</p>
<p>In an interim report on the attack, Dyn said: “We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.”</p>
<p>default passwords sought by machines infected with Mirai — username: root and password: xc3511 — is embedded in a broad array of white-labeled DVR and IP camera electronics boards made by a Chinese company called XiongMai Technologies. These components are sold downstream to vendors who then use them in their own products.</p>
<p>The scary part about IoT products that include XiongMai’s various electronics components, Flashpoint found, was that while users could change the default credentials in the devices’ Web-based administration panel, the password is hardcoded into the device firmware and the tools needed to disable it aren’t present.</p>
<p>In a statement issued on social media Monday, XiongMai (referring to itself as “XM”) said it would be issuing a recall on millions of devices — mainly network cameras.</p>
<p>Brian Karas, a business analyst with IPVM — a subscription-based news, testing and training site for the video surveillance industry which first reported the news of potential litigation by XM — said that over the past five years China’s market share in the video surveillance industry has surged, due to the efforts of companies like XiongMai and Dahua to expand globally, and from the growth of government-controlled security company Hikvision.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520734</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:02:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520734</guid>
		<description><![CDATA[Chinese Manufacturer Recalls IOT Gear Following Dyn DDoS
https://threatpost.com/chinese-manufacturer-recalls-iot-gear-following-dyn-ddos/121496/

Hangzhou Xiongmai said that it will recall millions of cameras sold in the U.S. in response to Friday’s DDoS attack against DNS provider Dyn that kept a number of web-based services such as Twitter, Github and others offline for much of the day. The Chinese manufacturer sells OEM white-label circuit boards and software for cameras, along with DVRs and network video recorders. Many of these types of IoT devices were compromised by the Mirai malware, which exploits default credentials in the equipment and corrals them into botnets used and sold for DDoS attacks.

The company said in its statement—translated via Google—that it would recall devices sold earlier and still in use, mainly one million cards used in network cameras, one million cloud network cameras, one million panoramic network cameras and 1.3 million network cameras. It believes only devices sold before April 2015 that have not been updated, are only protected by default credentials and are exposed to the public Internet are vulnerable. “(If) any of the above conditions are not met, Mai Xiong equipment cannot be attacked or manipulated so this attack had little impact on the actual use of male Mai device,” the company said in its statement.

Level 3 Communications, a Colorado-based telecommunications company and ISP said the bulk of the traffic used in the DDoS attack was UDP/53 and TCP/53 with the TCP traffic consisting of TCP DNS SYN attacks, while the UDP traffic was subdomain, or prefix label attacks.

Mirai could be a long-term menace. The source code for the malware, which was responsible for other massive DDoS attacks against Krebs on Security and French webhost OVH

See more at: Chinese Manufacturer Recalls IOT Gear Following Dyn DDoS https://wp.me/p3AjUX-vBC]]></description>
		<content:encoded><![CDATA[<p>Chinese Manufacturer Recalls IOT Gear Following Dyn DDoS<br />
<a href="https://threatpost.com/chinese-manufacturer-recalls-iot-gear-following-dyn-ddos/121496/" rel="nofollow">https://threatpost.com/chinese-manufacturer-recalls-iot-gear-following-dyn-ddos/121496/</a></p>
<p>Hangzhou Xiongmai said that it will recall millions of cameras sold in the U.S. in response to Friday’s DDoS attack against DNS provider Dyn that kept a number of web-based services such as Twitter, Github and others offline for much of the day. The Chinese manufacturer sells OEM white-label circuit boards and software for cameras, along with DVRs and network video recorders. Many of these types of IoT devices were compromised by the Mirai malware, which exploits default credentials in the equipment and corrals them into botnets used and sold for DDoS attacks.</p>
<p>The company said in its statement—translated via Google—that it would recall devices sold earlier and still in use, mainly one million cards used in network cameras, one million cloud network cameras, one million panoramic network cameras and 1.3 million network cameras. It believes only devices sold before April 2015 that have not been updated, are only protected by default credentials and are exposed to the public Internet are vulnerable. “(If) any of the above conditions are not met, Mai Xiong equipment cannot be attacked or manipulated so this attack had little impact on the actual use of male Mai device,” the company said in its statement.</p>
<p>Level 3 Communications, a Colorado-based telecommunications company and ISP said the bulk of the traffic used in the DDoS attack was UDP/53 and TCP/53 with the TCP traffic consisting of TCP DNS SYN attacks, while the UDP traffic was subdomain, or prefix label attacks.</p>
<p>Mirai could be a long-term menace. The source code for the malware, which was responsible for other massive DDoS attacks against Krebs on Security and French webhost OVH</p>
<p>See more at: Chinese Manufacturer Recalls IOT Gear Following Dyn DDoS <a href="https://wp.me/p3AjUX-vBC" rel="nofollow">https://wp.me/p3AjUX-vBC</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled-techcrunch/comment-page-1/#comment-1520733</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Oct 2016 08:00:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48485#comment-1520733</guid>
		<description><![CDATA[First Mea Culpa for Dyn hack as webcam manufacturer issues recall
The one who smelted it, dealt it
http://www.theinquirer.net/inquirer/news/2475142/first-mea-culpa-for-dyn-hack-as-webcam-manufacturer-issues-recall

THE FIRST Internet of Things (IoT) devices thought to be responsible for Friday’s giant Mirai DDoS attack on DNS provider Dyn have been recalled by their manufacturer.

Chinese firm Hangzhou Xiongmai specialises in motherboards for DVRs and IP cameras, both suspected of being part of the giant botnet used in the attack, the firm said in a statement

&quot;Security issues are a problem facing all mankind,&quot; it said on a Chinese microblog. &quot;Since industry giants have experienced them, Xiongmai is not afraid to experience them once, too.&quot;

We think that might be a Samsung dig.

The company is the first to take responsibility for products which may well have allowed many services including Twitter and Spotify to be taken offline at a stroke last Friday.

The main problems were caused by simple to hack user names and passwords on IoT devices, many of which never get changed from their defaults.

Xiongmai devices are particularly vulnerable, given that in many cases it doesn’t even offer the tools needed to change username and password. It may be that falling on its sword may prove a brilliant publicity coup for the company, which has promised to improve mechanisms of security on future products.

At present, it is still not known who was responsible for the attack, which was launched in three waves over a number of hours on Friday.]]></description>
		<content:encoded><![CDATA[<p>First Mea Culpa for Dyn hack as webcam manufacturer issues recall<br />
The one who smelted it, dealt it<br />
<a href="http://www.theinquirer.net/inquirer/news/2475142/first-mea-culpa-for-dyn-hack-as-webcam-manufacturer-issues-recall" rel="nofollow">http://www.theinquirer.net/inquirer/news/2475142/first-mea-culpa-for-dyn-hack-as-webcam-manufacturer-issues-recall</a></p>
<p>THE FIRST Internet of Things (IoT) devices thought to be responsible for Friday’s giant Mirai DDoS attack on DNS provider Dyn have been recalled by their manufacturer.</p>
<p>Chinese firm Hangzhou Xiongmai specialises in motherboards for DVRs and IP cameras, both suspected of being part of the giant botnet used in the attack, the firm said in a statement</p>
<p>&#8220;Security issues are a problem facing all mankind,&#8221; it said on a Chinese microblog. &#8220;Since industry giants have experienced them, Xiongmai is not afraid to experience them once, too.&#8221;</p>
<p>We think that might be a Samsung dig.</p>
<p>The company is the first to take responsibility for products which may well have allowed many services including Twitter and Spotify to be taken offline at a stroke last Friday.</p>
<p>The main problems were caused by simple to hack user names and passwords on IoT devices, many of which never get changed from their defaults.</p>
<p>Xiongmai devices are particularly vulnerable, given that in many cases it doesn’t even offer the tools needed to change username and password. It may be that falling on its sword may prove a brilliant publicity coup for the company, which has promised to improve mechanisms of security on future products.</p>
<p>At present, it is still not known who was responsible for the attack, which was launched in three waves over a number of hours on Friday.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
