The person responsible for shutting down large parts of the US internet in October was a disgruntled gamer, and not a Russian operative.
Dale Drew, chief security officer for Level 3 Communications, told a Congressional panel that the geeky hacker had rented time on a botnet in order to launch the attack.
BYPASS THE CENSORS
Sign up to get unfiltered news delivered straight to your inbox.
FBI Chief Found Dead After Exposing Sickening Truth About Elite Pedophilia
Disturbing Proof the WEF and UN Are Quietly Deleting the Internet
WEF Insider Reveals 'Bug-Eating Agenda' Is About Destroying the Human Soul
Coolio Was About To Take Down Hollywood Pedophile Ring Before He Died
Pope Francis Vows To Usher In ‘One World Religion’
Bill Gates Caught Admitting ‘Climate Change Is WEF Scam’ to Inner Circle
Elites Panic As Queen’s Death Threatens To Expose Pedophile Ring
WEF Anoint Charles ‘The Great Reset King’
WEF To Force Public To Wear ‘Brain Implants’ So the Elite Can Read Their Minds
Using a powerful malware known as Mirai, the attacker harnessed some 150,000 “Internet of Things” (IoT) devices such as cameras, lightbulbs and appliances to overwhelm the systems of Dynamic Network Services Inc, or Dyn, which operates a key hub in the internet, according to Drew.
The so-called distributed denial of service attack jammed up traffic routing the Dyn’s servers to major websites like Amazon, Twitter and Netflix for hours before the attack could be overwhelmed.
“We believe that in the case of Dyn, the relatively unsophisticated attacker sought to take offline a gaming site with which it had a personal grudge and rented time on the IoT botnet to accomplish this,” he said.
Drew did not identify the gaming site but The Wall Street Journal, citing people familiar with the attack, said it was the PlayStation network.
At the time, there were worries that a foreign government might have been behind the attack.
Drew said the ability of hackers to make use of mundane home electronics to mount such an attack signalled a huge new risk in the global internet circuitry.
He said IoT devices often have easily hackable passwords, including hard-wired passwords that owners cannot change.
“IoT devices also are particularly attractive targets because users often have little way to know when they have been compromised. Unlike a personal computer or phone, which has endpoint protection capabilities and the user is more likely to notice when it performs improperly, compromised IoT devices may go unnoticed for longer periods of time.”
He noted that such devices are widespread around the world, including in areas with few cybersecurity protections, and that the October attack made use of “just a fraction” of those available. Mirai, he said, has infected nearly two million devices connected to the internet.
“The current lack of any security standards for IoT devices is certainly part of the problem that ought to be addressed.”
Latest posts by Sean Adl-Tabatabai (see all)
- U.S. Buys $290M Worth of Anti-Radiation Drugs Amid Nuclear War Fears - October 6, 2022
- MSNBC: ‘Pro-Lifers Are Pedophiles’ - October 6, 2022
- ‘Tainted Blood’: Study Finds 94 Percent of Vaccinated Patients Have Abnormal Blood - October 6, 2022