New Fortinet findings show that the P2P Hide ‘N Seek (HNS) now also includes exploits to target and devices, noting: “Hide ‘N Seek authors recently included an exploit for a HomeMatic Zentrale CCU2 remote code execution , the malicious code allows the botnet to target devices in smart homes controller by the HomeMatic central unit.”  In response, a botnet expert with Corero Network Security offers perspective.

Sean Newman, Director Product Management at Corero Network Security:

- 1x1 - HNS Bot Adds Exploits To Hit Home Automation Systems & Devices

“The continued evolution of the Hide ‘N Seek botnet, gathering up new IoT vulnerabilities which enable it to ensnare devices from an ever-expanding list of manufacturers, illustrates the extent to which attackers are now able to construct these damaging botnets.  And the worrying thing is, that they no longer need to rely on the simplistic password brute-forcing of the original Mirai botnet.  Organizations need to ensure they are prepared against the potential uses for these botnets, including the damaging DDoS attacks they can launch.”



Source link
Based Blockchain Network

LEAVE A REPLY

Please enter your comment!
Please enter your name here