Botnets are wide networks of pirated devices that can be operated remotely by their master (the hacker). Criminal syndicates mostly use them for profits, such as used to mine crypto-currencies, or they can be targeted to use up the bandwidth – thereby, slowing down the various site, through the denial of service attacks.
誰面臨殭屍網路的威脅?
殭屍網路瞄準的主要設備是過時的機器 - 仍在運行,但被忽視並留在學校,氣象站,博物館的角落 - 以及不安全的物聯網小工具。
Simply put, when an internet-connected device stays out of date for so long, then it becomes vulnerable since more unaddressed security flaws are discovered. These security flaws will somewhat give access to the attacker, who will control your machine remotely – they will then send any illegal tasks to it, say a task to open the server.
此外,任何長時間無人看管的計算機,因此,它們最終會耗盡頻寬、處理能力;再加上一些連創作者都會解決的奇怪行為。一些設備總是受到殭屍網路攻擊的風險,包括監控攝像頭、智慧冰箱、恒溫器、圖書館計算機——這些設備可能會受到攻擊並長時間被忽視。
殭屍網路和物聯網
Most IoT devices always ship with weak-default passwords, and their pattern of login credentials is always the same. And with each tech-advancing day, manufacturers are using poorer security techniques on their smart gadgets, while exerting pressure for lower prices.
The extent of how insecure most smart-home gadgets might be is overly undetermined. The joke on the security of IoT devices was heightened by the attempt of the Japanese government who wanted to use the default login credentials to hack into these smart-home devices – as a security measure, they said.
It remains a subject of discussion, whether it’s the right move by authorities to demand access to its citizen’s private possessions. However, an argument continues, whether using default login credentials on these gadgets is the same as leaving them without passwords at all.
也許是現實生活中的一個例子:讓員警在停車場巡邏試圖找到未上鎖的車輛可以嗎?同樣的員警試圖關閉未上鎖的車門是個好主意嗎?
殭屍網路有什麼作用?
殭屍網路可以造成各種常見的安全危害,具體取決於運營商想要什麼:
- Spam; Botnets can distribute millions of spam globally. They can use email platforms to spread their spam messages. For instance, in 2018, the average email spam sent between January and September was 56.69%.
- 惡意軟體;殭屍網路可以將惡意軟體和間諜軟體傳送到不安全的計算機。大多數犯罪集團使用殭屍網路來買賣各種犯罪企業。
- 數據;殭屍網路可以捕獲您的密碼和其他個人數據。
- Click baits; botnets can send phishing links, adverts and specific attractive images with false information.
- 加密貨幣;殭屍網路能夠將私人控制器發送到不安全的設備以挖掘比特幣和其他加密貨幣,而無需合法
- DDoS;殭屍網路詐騙者可以將這些不安全機器的力量引導到目標設備,使它們處於 DDoS 模式的離線模式。
殭屍網路詐騙者通常會調整其網路設置以使其其中一些功能產生利潤。例如,殭屍網路運營商向美國公民發送醫療垃圾郵件,也有他們的藥劑師提供商品和產品。
如何防止殭屍網路攻擊您的設備
始終更新您的機器軟體應用程式以獲取最新的網路安全功能。養成不斷更改各種智慧家居設備密碼的習慣 - 請記住遵循密碼創建規則。
However, all IoT device manufacturers are expected to start practicing improving the security levels of its products. Users should also demand improved privacy and protection when using smart devices.
Be Smart, Use IPBurger VPN
Using IPBurger VPN especially on your router will protect all your devices from most internet threats and attacks. IPBurger VPN uses the AES 256-bit encryption which ensures no prying eyes get access to your data nor devices. IPBurger VPN also ensures your devices are private when they access the internet. This is because IPBurger VPN assigns them a virtual IP address which hides their real IP address hence privacy.