SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
WHAT HAPPENED ON 10/21?
A look at the attack that brought down half of the websites in the US
WHAT HAPPENED?
• A malware program called Mirai took over online devices and used them to
attack the Internet
• The attacks were called DDoS, which stands for distributed denial of service
• In a DDoS, all available devices go to one service at the same time. The
service is overwhelmed and it shuts down.
• Example in real life: Amazon on Black Friday
• The program began on Friday morning in the East Coast. When they thought
it was under control, a second wave began and it quickly infected the West
Coast as well.
HOW IT SPREAD
HOW DID IT HAPPEN?
• Mirai (a Trojan Virus) scans the Internet for systems protected by factory
default or hard coded usernames and passwords.
• Exploits weak security measures (standard usernames and passwords)
• Devices are then infected with malware, which takes them to a central
control system, where they are all directed to the same site at once.
• Devices affected are the Internet of Things (IoT) devices, such as web
cameras, printers, home automated devices and even some routers.
WHY WAS IT SO MASSIVE?
• The source code was released on the Dark web sites at the beginning of the
month
• There are nearly half a million Mira-powered bots worldwide.
• Friday’s attack was “well planned and executed”, involving “tens of millions
of IP addresses at the same time”.
• This is a dangerous program because
• It works in stealth (delay from infection to inception)
• It is undetected and unseen
• It is encoded
• It can rapidly spread via connected devices
WHO CREATED
MIRAI?
• Nickname of person is
“Anna-Senpai”
• Anime character and
appears in a Japanese
novel series called
Shimoseka, set in a future
filed with morality police.
• Anna is the enforcer of
public morality laws.
HOW DID IT WORK?
• Began at DYN, a New Hampshire based Internet company that provides
domain name service (DNS) to popular sites
• You enter an URL (twitter.com), and your computer goes to the IP address
for Twitter. DNS (think of it as a GPS for computers) translates URLs into IP
addresses, and allows browsers to connect with websites.
• Sites like Twitter are duplicated and stored on several servers. The DNS helps
the browser to know what data is best to use.
• When DYN was targeted, the process was interrupted so your browser didn’t
know what IP address to go to. (Similar to losing your GPS when you don’t
know where to go).
HAS IT HAPPENED BEFORE?
• Security experts believe that this attack is the same that used networks of
connected devices to bring down websites.
• The “Internet of Things” (IoT), is particularly vulnerable since it is not designed
for security and they have no additional security precautions.
• There is a list of potential products which may be targeted, since they were
designed with substandard usernames and passwords. They are most
vulnerable to attacks. (next slide)
POTENTIALLY
VULNERABLE
DEVICES
WHAT CAN BE DONE?
• Make sure your home network is secure (complex passwords, passwords for
connected devices if possible, don’t buy devices with no password
protection, don’t store passwords online, beware of email links and
passwords).
• Companies need to set up industry standard, which will then create a
consumer seal of approval. As consumers, we would only purchase those
who adhere to the standard.
• You can reboot your infected systems. However, they can be re-infected
within minutes of a reboot.
• Change the default password if possible.

Weitere ähnliche Inhalte

Was ist angesagt?

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
aliuet
 

Was ist angesagt? (20)

Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Hacking
HackingHacking
Hacking
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Cyber security
Cyber securityCyber security
Cyber security
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 

Andere mochten auch (7)

An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
I Never Forget A Face
I Never Forget A FaceI Never Forget A Face
I Never Forget A Face
 
The night we won the buick
The night we won the buickThe night we won the buick
The night we won the buick
 
Burning fat
Burning fatBurning fat
Burning fat
 
No one cares about your damn emails
No one cares about your damn emailsNo one cares about your damn emails
No one cares about your damn emails
 

Ähnlich wie What happened on October 21

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 

Ähnlich wie What happened on October 21 (20)

Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Web security
Web securityWeb security
Web security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 

Mehr von San Diego Continuing Education

Mehr von San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 
Proper footwear for walking
Proper footwear for walkingProper footwear for walking
Proper footwear for walking
 
Hearing loss
Hearing lossHearing loss
Hearing loss
 
Exercise technology
Exercise technologyExercise technology
Exercise technology
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
Presentation social networks
Presentation social networksPresentation social networks
Presentation social networks
 
Presentation social networks with screenshots
Presentation social networks with screenshotsPresentation social networks with screenshots
Presentation social networks with screenshots
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

What happened on October 21

  • 1. WHAT HAPPENED ON 10/21? A look at the attack that brought down half of the websites in the US
  • 2. WHAT HAPPENED? • A malware program called Mirai took over online devices and used them to attack the Internet • The attacks were called DDoS, which stands for distributed denial of service • In a DDoS, all available devices go to one service at the same time. The service is overwhelmed and it shuts down. • Example in real life: Amazon on Black Friday • The program began on Friday morning in the East Coast. When they thought it was under control, a second wave began and it quickly infected the West Coast as well.
  • 4. HOW DID IT HAPPEN? • Mirai (a Trojan Virus) scans the Internet for systems protected by factory default or hard coded usernames and passwords. • Exploits weak security measures (standard usernames and passwords) • Devices are then infected with malware, which takes them to a central control system, where they are all directed to the same site at once. • Devices affected are the Internet of Things (IoT) devices, such as web cameras, printers, home automated devices and even some routers.
  • 5. WHY WAS IT SO MASSIVE? • The source code was released on the Dark web sites at the beginning of the month • There are nearly half a million Mira-powered bots worldwide. • Friday’s attack was “well planned and executed”, involving “tens of millions of IP addresses at the same time”. • This is a dangerous program because • It works in stealth (delay from infection to inception) • It is undetected and unseen • It is encoded • It can rapidly spread via connected devices
  • 6. WHO CREATED MIRAI? • Nickname of person is “Anna-Senpai” • Anime character and appears in a Japanese novel series called Shimoseka, set in a future filed with morality police. • Anna is the enforcer of public morality laws.
  • 7. HOW DID IT WORK? • Began at DYN, a New Hampshire based Internet company that provides domain name service (DNS) to popular sites • You enter an URL (twitter.com), and your computer goes to the IP address for Twitter. DNS (think of it as a GPS for computers) translates URLs into IP addresses, and allows browsers to connect with websites. • Sites like Twitter are duplicated and stored on several servers. The DNS helps the browser to know what data is best to use. • When DYN was targeted, the process was interrupted so your browser didn’t know what IP address to go to. (Similar to losing your GPS when you don’t know where to go).
  • 8. HAS IT HAPPENED BEFORE? • Security experts believe that this attack is the same that used networks of connected devices to bring down websites. • The “Internet of Things” (IoT), is particularly vulnerable since it is not designed for security and they have no additional security precautions. • There is a list of potential products which may be targeted, since they were designed with substandard usernames and passwords. They are most vulnerable to attacks. (next slide)
  • 10. WHAT CAN BE DONE? • Make sure your home network is secure (complex passwords, passwords for connected devices if possible, don’t buy devices with no password protection, don’t store passwords online, beware of email links and passwords). • Companies need to set up industry standard, which will then create a consumer seal of approval. As consumers, we would only purchase those who adhere to the standard. • You can reboot your infected systems. However, they can be re-infected within minutes of a reboot. • Change the default password if possible.