• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • Automotive
    • Connectivity
    • Consumer Electronics
    • Industrial
    • Medical
    • Security
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Videos
    • TI Microcontroller Videos
  • EE Resources
    • DesignFast
    • eBooks / Tech Tips
    • FAQs
    • LEAP Awards
    • Podcasts
    • Webinars
    • White Papers
  • EE Learning Center
    • Design Guides
      • WiFi & the IOT Design Guide
      • Microcontrollers Design Guide
      • State of the Art Inductors Design Guide
      • Power Electronics & Programmable Power

Vigilante Cyber-Justice in the Wild, Wild IoT

May 2, 2017 By Aimee Kalnoskas

by Alan Grau, president and co-founder of Icon Labs.

Stories of vigilante justice during the “wild, wild west” period in US history are legendary.  According to legend, outlaws roamed cattle towns and remote settlements overwhelming law enforcement and thriving wherever law enforcement was lax. Whenever things got too bad, citizens would sometimes band together and try to take matters into their own hands, dishing out retribution in a way that sometimes served justice and at other times, resulted in new crimes more heinous than the original offense.   

Recently, with a lax environment for IoT device cyber-security, a hacker, self-proclaimed as “The Janitor,” launched his or her own vigilante style cyber-attack. The attack targeted devices that failed to meet basic cyber-security requirements, such as not requiring end users to change default passwords.  The attack modified critical code and/or data stored on these devices to “brick” the devices thereby rendering them unusable.

The Janitor, in a manifesto released accompanying the cyber-attack, said he likes to think of himself as “The Doctor” and described the attack as a sort of “cyber-chemotherapy.”  Just as chemotherapy is an extreme action taken to rid the body of harmful cells, his cyber-attack would rid the Internet of IoT devices he felt contributed to the Internet becoming “seriously ill.” 

The recent Mirai attack, in which thousands of insecure IoT devices were used to create a botnet that launched cyberattacks, was cited as justification.  His rationale was that these unprotected devices leave us all vulnerable to cyber-attacks that could inflict serious damage on us as a society.  As you may recall, last year’s Mirai DDoS attack shut down the websites of major companies, bringing e-commerce to a halt in some locations.  The Doctor wants to prevent these types of attacks from happening again.

The Doctor’s actions, while clearly illegal, highlight an important issue.  Despite the growing threat of attack, companies are not adequately investing in security. 

And until companies appreciate the risk involved in distributing unsecured devices, cyber-attacks will continue to occur.  Regardless of the motivation behind the attack, ultimately, it is those OEMs that produce products lacking security that are mostly to blame.  Just as societies without strong law enforcement result in higher crime rates and vigilante justice, lax security results in increased cybercrime.

This blog first appeared on the Icon Labs’ website 

Filed Under: Applications, Connectivity, IoT, Security Tagged With: iconlabs

Primary Sidebar

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

EE Training Center Classrooms

EE Classrooms

CURRENT DIGITAL ISSUE

A frequency you can count on There are few constants in life, but what few there are might include death, taxes, and a U.S. grid frequency that doesn’t vary by more than ±0.5 Hz. However, the certainty of the grid frequency is coming into question, thanks to the rising percentage of renewable energy sources that…

Digital Edition Back Issues

Subscribe to our Newsletter

Subscribe to weekly industry news, new product innovations and more.

Subscribe today

RSS Current EDABoard.com discussions

  • How to set USB port as RS-485 entrance? How to interpret Growatt solar inverter commands?
  • Find Critical Path in Cadence Genus?
  • Simulation of a Press-ON-Press-OFF push button
  • HFSS 2022 R2 - Waveguide port configuration
  • Why this antenna azimuth and elevation direction are the same?

RSS Current Electro-Tech-Online.com Discussions

  • How know if solder iron has good quality tip?
  • How does a transistor works as a switch?
  • Peltier control
  • How to set USB port as RS-485 entrance? How to interpret Growatt solar inverter commands?
  • Component Identification

Footer

Microcontroller Tips

EE World Online Network

  • DesignFast
  • EE World Online
  • EDA Board Forums
  • Electro Tech Online Forums
  • Connector Tips
  • Analog IC Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • Wire and Cable Tips
  • 5G Technology World

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us
Follow us on Twitter Add us on Facebook Follow us on YouTube  Follow us on Instagram

Copyright © 2022 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy