SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
WHAT HAPPENED ON 10/21?
A look at the attack that brought down half of the websites in the US
WHAT HAPPENED?
• A malware program called Mirai took over online devices and used them to
attack the Internet
• The attacks were called DDoS, which stands for distributed denial of service
• In a DDoS, all available devices go to one service at the same time. The
service is overwhelmed and it shuts down.
• Example in real life: Amazon on Black Friday
• The program began on Friday morning in the East Coast. When they thought
it was under control, a second wave began and it quickly infected the West
Coast as well.
HOW IT SPREAD
HOW DID IT HAPPEN?
• Mirai (a Trojan Virus) scans the Internet for systems protected by factory
default or hard coded usernames and passwords.
• Exploits weak security measures (standard usernames and passwords)
• Devices are then infected with malware, which takes them to a central
control system, where they are all directed to the same site at once.
• Devices affected are the Internet of Things (IoT) devices, such as web
cameras, printers, home automated devices and even some routers.
WHY WAS IT SO MASSIVE?
• The source code was released on the Dark web sites at the beginning of the
month
• There are nearly half a million Mira-powered bots worldwide.
• Friday’s attack was “well planned and executed”, involving “tens of millions
of IP addresses at the same time”.
• This is a dangerous program because
• It works in stealth (delay from infection to inception)
• It is undetected and unseen
• It is encoded
• It can rapidly spread via connected devices
WHO CREATED
MIRAI?
• Nickname of person is
“Anna-Senpai”
• Anime character and
appears in a Japanese
novel series called
Shimoseka, set in a future
filed with morality police.
• Anna is the enforcer of
public morality laws.
HOW DID IT WORK?
• Began at DYN, a New Hampshire based Internet company that provides
domain name service (DNS) to popular sites
• You enter an URL (twitter.com), and your computer goes to the IP address
for Twitter. DNS (think of it as a GPS for computers) translates URLs into IP
addresses, and allows browsers to connect with websites.
• Sites like Twitter are duplicated and stored on several servers. The DNS helps
the browser to know what data is best to use.
• When DYN was targeted, the process was interrupted so your browser didn’t
know what IP address to go to. (Similar to losing your GPS when you don’t
know where to go).
HAS IT HAPPENED BEFORE?
• Security experts believe that this attack is the same that used networks of
connected devices to bring down websites.
• The “Internet of Things” (IoT), is particularly vulnerable since it is not designed
for security and they have no additional security precautions.
• There is a list of potential products which may be targeted, since they were
designed with substandard usernames and passwords. They are most
vulnerable to attacks. (next slide)
POTENTIALLY
VULNERABLE
DEVICES
WHAT CAN BE DONE?
• Make sure your home network is secure (complex passwords, passwords for
connected devices if possible, don’t buy devices with no password
protection, don’t store passwords online, beware of email links and
passwords).
• Companies need to set up industry standard, which will then create a
consumer seal of approval. As consumers, we would only purchase those
who adhere to the standard.
• You can reboot your infected systems. However, they can be re-infected
within minutes of a reboot.
• Change the default password if possible.

Mais conteúdo relacionado

Mais procurados

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
aliuet
 

Mais procurados (20)

Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Hacking
HackingHacking
Hacking
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Cyber security
Cyber securityCyber security
Cyber security
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 

Destaque (7)

An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
I Never Forget A Face
I Never Forget A FaceI Never Forget A Face
I Never Forget A Face
 
The night we won the buick
The night we won the buickThe night we won the buick
The night we won the buick
 
Burning fat
Burning fatBurning fat
Burning fat
 
No one cares about your damn emails
No one cares about your damn emailsNo one cares about your damn emails
No one cares about your damn emails
 

Semelhante a What happened on October 21

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 

Semelhante a What happened on October 21 (20)

Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Web security
Web securityWeb security
Web security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 

Mais de San Diego Continuing Education

Mais de San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 
Proper footwear for walking
Proper footwear for walkingProper footwear for walking
Proper footwear for walking
 
Hearing loss
Hearing lossHearing loss
Hearing loss
 
Exercise technology
Exercise technologyExercise technology
Exercise technology
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
Presentation social networks
Presentation social networksPresentation social networks
Presentation social networks
 
Presentation social networks with screenshots
Presentation social networks with screenshotsPresentation social networks with screenshots
Presentation social networks with screenshots
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

What happened on October 21

  • 1. WHAT HAPPENED ON 10/21? A look at the attack that brought down half of the websites in the US
  • 2. WHAT HAPPENED? • A malware program called Mirai took over online devices and used them to attack the Internet • The attacks were called DDoS, which stands for distributed denial of service • In a DDoS, all available devices go to one service at the same time. The service is overwhelmed and it shuts down. • Example in real life: Amazon on Black Friday • The program began on Friday morning in the East Coast. When they thought it was under control, a second wave began and it quickly infected the West Coast as well.
  • 4. HOW DID IT HAPPEN? • Mirai (a Trojan Virus) scans the Internet for systems protected by factory default or hard coded usernames and passwords. • Exploits weak security measures (standard usernames and passwords) • Devices are then infected with malware, which takes them to a central control system, where they are all directed to the same site at once. • Devices affected are the Internet of Things (IoT) devices, such as web cameras, printers, home automated devices and even some routers.
  • 5. WHY WAS IT SO MASSIVE? • The source code was released on the Dark web sites at the beginning of the month • There are nearly half a million Mira-powered bots worldwide. • Friday’s attack was “well planned and executed”, involving “tens of millions of IP addresses at the same time”. • This is a dangerous program because • It works in stealth (delay from infection to inception) • It is undetected and unseen • It is encoded • It can rapidly spread via connected devices
  • 6. WHO CREATED MIRAI? • Nickname of person is “Anna-Senpai” • Anime character and appears in a Japanese novel series called Shimoseka, set in a future filed with morality police. • Anna is the enforcer of public morality laws.
  • 7. HOW DID IT WORK? • Began at DYN, a New Hampshire based Internet company that provides domain name service (DNS) to popular sites • You enter an URL (twitter.com), and your computer goes to the IP address for Twitter. DNS (think of it as a GPS for computers) translates URLs into IP addresses, and allows browsers to connect with websites. • Sites like Twitter are duplicated and stored on several servers. The DNS helps the browser to know what data is best to use. • When DYN was targeted, the process was interrupted so your browser didn’t know what IP address to go to. (Similar to losing your GPS when you don’t know where to go).
  • 8. HAS IT HAPPENED BEFORE? • Security experts believe that this attack is the same that used networks of connected devices to bring down websites. • The “Internet of Things” (IoT), is particularly vulnerable since it is not designed for security and they have no additional security precautions. • There is a list of potential products which may be targeted, since they were designed with substandard usernames and passwords. They are most vulnerable to attacks. (next slide)
  • 10. WHAT CAN BE DONE? • Make sure your home network is secure (complex passwords, passwords for connected devices if possible, don’t buy devices with no password protection, don’t store passwords online, beware of email links and passwords). • Companies need to set up industry standard, which will then create a consumer seal of approval. As consumers, we would only purchase those who adhere to the standard. • You can reboot your infected systems. However, they can be re-infected within minutes of a reboot. • Change the default password if possible.