The National Cyber Security Centre (NCSC) are urging businesses to protect their systems from an evolving threat. Recently, a China-based group has weaponised a network of over 260,000 compromised devices, posing a global risk.
View WhitepaperThe National Cyber Security Centre (NCSC) are urging businesses to protect their systems from an evolving threat. Recently, a China-based group has weaponised a network of over 260,000 compromised devices, posing a global risk.
These botnets carry malware and can infect various internet-connected devices such as routers, webcams, and CCTV systems - allowing cyber criminals to conduct attacks like DDoS or deliver malware, all without the owner's knowledge. Notably, older or unsecured devices are at a higher risk. Companies are advised to assess and update their security systems to mitigate potential threats, with around 126,000 of these compromised devices located in the US and 8,500 in the UK.
A botnet is a collection of infected devices, controlled remotely by attackers. These devices can include routers, webcams, and more. One of the most common uses of botnets is to launch Distributed Denial of Service (DDoS) attacks.
In a DDoS attack, cybercriminals flood a target website or online service with an overwhelming amount of traffic, causing it to crash or become unavailable. These attacks are disruptive and can cripple websites, e-commerce platforms, and even internal business systems.
Imagine hundreds of thousands of people trying to enter a shop at once. The sheer volume would prevent anyone from entering or exiting. In a DDoS attack, this "crowd" is digital traffic generated by compromised devices. By overwhelming the network or website with requests, attackers effectively block legitimate users from accessing the service. The attackers often remain anonymous, making these attacks difficult to trace.
Whether you’re a business or an individual, there are several steps you can take to prevent your devices from becoming part of a botnet and protect yourself from DDoS attacks:
Ensure that all devices, from routers to webcams, have the latest firmware updates. Outdated software often contains vulnerabilities that cybercriminals exploit.
Default or weak passwords make it easy for attackers to gain control of your devices. Change default login credentials and use complex passwords.
Employ tools that monitor your network for unusual traffic. These tools can detect and prevent malicious activity before it causes harm.
For businesses, investing in DDoS mitigation services can help absorb the large volumes of traffic from a DDoS attack. Cloud-based solutions can filter out malicious traffic, allowing legitimate requests to pass through.