DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Hacker leaks passwords for 5 lakh Internet-connected devices

DigitalCIO Bureau by DigitalCIO Bureau
January 20, 2020
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Source: IANS

A hacker has leaked usernames and passwords of over five lakh servers, routers and Internet of Things (IoT) devices on the Dark Web. Attackers could use those credentials to gain remote access to the affected devices, like we have seen recently in some home cameras and devices, including Amazon-owned Ring security cameras.

A hacker has leaked usernames and passwords of over five lakh servers, routers and Internet of Things (IoT) devices on the Dark Web which can be used to install malware on Internet-connected devices at home or at work.

Attackers could use those credentials to gain remote access to the affected devices, like we have seen recently in some home cameras and devices, including Amazon-owned Ring security cameras.

According to a ZDNet report on Sunday, the list of Telnet credentials has been published on a popular hacking forum that includes each device’s IP address, along with a username and password for the Telnet service.

Telnet is one of the earliest remote login protocols on the Internet. It is a client-server protocol that provides the user a terminal session to the remote host from the telnet client application.

“Hackers scan the internet to build bot lists, and then use them to connect to the devices and install malware,” said the report.

The list has been published online by the maintainer of a Direct Denial of Service (DDoS) botnet operator.

However, some of these devices might now run on a different IP address, or use different login credentials.

“Some devices were located on the networks of known Internet service providers (indicating they were either home router or IoT devices), but other devices were located on the networks of major Cloud service providers,” the report mentioned.

The five lakh devices still remain at hacking risk as a hacker can use the IP addresses included in the lists and then re-scan the internet service provider’s network to update the list with the latest IP addresses.

Amazon’s Ring subsidiary came in news for all the wrong reasons where customers’ in-house cameras were broken into and the hackers tried to intimated the residents, including children.

In a bone-chilling incident, parents of an eight-year-old girl in the US were left stunned when a hacker accessed a camera installed in their daughter’s room and taunted her.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Data Recovery Experts Expand their Cloud and Security Skills at VeeamON Tour India

by DigitalCIO Bureau
September 1, 2023
0
Data Recovery Experts Expand their Cloud and Security Skills at VeeamON Tour India

Veeam Software flagged off its highly anticipated VeeamON Tour India 2023 in Mumbai today, delivering a rich experience to over 600 registrants. This month-long tour comes as an...

Read more

Dell Technologies Announces Intent to Acquire Moogsoft

by DigitalCIO Bureau
August 20, 2023
0
Dell Technologies Announces Intent to Acquire Moogsoft

Dell Technologies (NYSE: DELL) announced it has signed a definitive agreement to acquire Moogsoft, an AI-driven provider of intelligent monitoring solutions that support DevOps and ITOps.This transaction will further enhance...

Read more

Government Technology Agency of Singapore concludes third HackerOne bug bounty programme

by DigitalCIO Bureau
August 20, 2023
0

GovTech Singapore resolved 33 security weaknesses and awarded global hacker community over US$30,800 for contributing to a more secure and resilient smart nation HackerOne and Singapore's Government Technology...

Read more

XProtect(R) on Amazon Web Services Now Available in AWS Marketplace

by DigitalCIO Bureau
August 20, 2023
0

Customers with a cloud-first strategy and those looking for a hybrid VMS solution can now deploy a pre-configured XProtect as an elastic solution available globally with high flexibility...

Read more

OurCrowd Pandemic Innovation Conference to host global leaders, startups and investors online

by DigitalCIO Bureau
August 20, 2023
0

June 22 forum features tech solutions to global crisis, $100m OurCrowd Pandemic Innovation Fund OurCrowd will host the OurCrowd Pandemic Innovation Conference on June 22 to explore the...

Read more
Next Post

Zomato buys Uber Eats in an all-stock deal

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

NetApp brings new mid-range storage system

May 13, 2019

Freelance jobs rise as firms get used to WFH

May 16, 2020

Panasonic Toughbook FZ-L1 Tablet Launched

July 27, 2018

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Cloud Computing Commvault CrowdStrike Customer Experience Cybersecurity Dell Technologies DigiCert Digital Transformation E-books Fortinet Gartner GenAI Generative AI IBM IDC Infographics Infosys Internet of Things (IoT) Microsoft Netskope New Relic Oracle Palo Alto Networks Panel Discussion ransomware Salesforce SAP SonicWall Sophos Tenable Trend Micro Veeam Software Vertiv Webinars Whitepaper

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2023 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2023 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?