• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Vigilante Cyber-Justice in the Wild, Wild IoT

May 2, 2017 By Aimee Kalnoskas Leave a Comment

by Alan Grau, president and co-founder of Icon Labs.

Stories of vigilante justice during the “wild, wild west” period in US history are legendary.  According to legend, outlaws roamed cattle towns and remote settlements overwhelming law enforcement and thriving wherever law enforcement was lax. Whenever things got too bad, citizens would sometimes band together and try to take matters into their own hands, dishing out retribution in a way that sometimes served justice and at other times, resulted in new crimes more heinous than the original offense.   

Recently, with a lax environment for IoT device cyber-security, a hacker, self-proclaimed as “The Janitor,” launched his or her own vigilante style cyber-attack. The attack targeted devices that failed to meet basic cyber-security requirements, such as not requiring end users to change default passwords.  The attack modified critical code and/or data stored on these devices to “brick” the devices thereby rendering them unusable.

The Janitor, in a manifesto released accompanying the cyber-attack, said he likes to think of himself as “The Doctor” and described the attack as a sort of “cyber-chemotherapy.”  Just as chemotherapy is an extreme action taken to rid the body of harmful cells, his cyber-attack would rid the Internet of IoT devices he felt contributed to the Internet becoming “seriously ill.” 

The recent Mirai attack, in which thousands of insecure IoT devices were used to create a botnet that launched cyberattacks, was cited as justification.  His rationale was that these unprotected devices leave us all vulnerable to cyber-attacks that could inflict serious damage on us as a society.  As you may recall, last year’s Mirai DDoS attack shut down the websites of major companies, bringing e-commerce to a halt in some locations.  The Doctor wants to prevent these types of attacks from happening again.

The Doctor’s actions, while clearly illegal, highlight an important issue.  Despite the growing threat of attack, companies are not adequately investing in security. 

And until companies appreciate the risk involved in distributing unsecured devices, cyber-attacks will continue to occur.  Regardless of the motivation behind the attack, ultimately, it is those OEMs that produce products lacking security that are mostly to blame.  Just as societies without strong law enforcement result in higher crime rates and vigilante justice, lax security results in increased cybercrime.

This blog first appeared on the Icon Labs’ website 

Filed Under: Applications, Connectivity, IoT, Security Tagged With: iconlabs

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy