DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Hacker leaks passwords for 5 lakh Internet-connected devices

DigitalCIO Bureau by DigitalCIO Bureau
January 20, 2020
in Archive
0
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Source: IANS

A hacker has leaked usernames and passwords of over five lakh servers, routers and Internet of Things (IoT) devices on the Dark Web. Attackers could use those credentials to gain remote access to the affected devices, like we have seen recently in some home cameras and devices, including Amazon-owned Ring security cameras.

A hacker has leaked usernames and passwords of over five lakh servers, routers and Internet of Things (IoT) devices on the Dark Web which can be used to install malware on Internet-connected devices at home or at work.

Attackers could use those credentials to gain remote access to the affected devices, like we have seen recently in some home cameras and devices, including Amazon-owned Ring security cameras.

According to a ZDNet report on Sunday, the list of Telnet credentials has been published on a popular hacking forum that includes each device’s IP address, along with a username and password for the Telnet service.

Telnet is one of the earliest remote login protocols on the Internet. It is a client-server protocol that provides the user a terminal session to the remote host from the telnet client application.

“Hackers scan the internet to build bot lists, and then use them to connect to the devices and install malware,” said the report.

The list has been published online by the maintainer of a Direct Denial of Service (DDoS) botnet operator.

However, some of these devices might now run on a different IP address, or use different login credentials.

“Some devices were located on the networks of known Internet service providers (indicating they were either home router or IoT devices), but other devices were located on the networks of major Cloud service providers,” the report mentioned.

The five lakh devices still remain at hacking risk as a hacker can use the IP addresses included in the lists and then re-scan the internet service provider’s network to update the list with the latest IP addresses.

Amazon’s Ring subsidiary came in news for all the wrong reasons where customers’ in-house cameras were broken into and the hackers tried to intimated the residents, including children.

In a bone-chilling incident, parents of an eight-year-old girl in the US were left stunned when a hacker accessed a camera installed in their daughter’s room and taunted her.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

SoftBank Acquires DigitalBridge for $4 billion

by DigitalCIO Bureau
January 2, 2026
0
CRISIL To Acquire Bridge To India Energy

SoftBank Group has entered into a definitive agreement to acquire DigitalBridge Group, a leading global alternative asset manager dedicated to investing in digital infrastructure, including data centers, cell...

Read moreDetails

Barracuda Research Identifies GhostFrame Phishing Kit

by DigitalCIO Bureau
December 23, 2025
0
Barracuda Introduces ‘Barracuda Research

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility....

Read moreDetails

Arctic Wolf Snaps up UpSight Security

by DigitalCIO Bureau
November 6, 2025
0
CRISIL To Acquire Bridge To India Energy

Security company Arctic Wolf has acquired UpSight Security to enhance its Aurora Endpoint Security solution with AI-driven features for ransomware prevention and rollback recovery. Through the acquisition of UpSight Security,...

Read moreDetails

Vanguard Launches Global Technology Center in Hyderabad

by DigitalCIO Bureau
November 4, 2025
0
Vanguard Launches Global Technology Center in Hyderabad

Vanguard has launched its Global Technology Center in Hyderabad, marking a significant milestone in the firm’s technology transformation. The new office reflects Vanguard’s recognition of India as a...

Read moreDetails

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails
Next Post

Zomato buys Uber Eats in an all-stock deal

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Global IT Spending to Reach $3.8 Trillion in 2019, Up 3.2 Percent

January 28, 2019
Veeam Positioned As A Leader In The 2023 Gartner Magic Quadrant

Veeam Positioned As A Leader In The 2023 Gartner Magic Quadrant

August 20, 2023
Oracle Denies Claims of Massive Data Breach

Food giant Kellogg confirms data breach

April 9, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?