Home Internet Holes Appear in Internet-Connected Toothbrush Botnet Warning

Holes Appear in Internet-Connected Toothbrush Botnet Warning

Don’t Brush in Fear, as Supposed DDoS Dental Trauma Fails to Pass Muster


February 7, 2024    

Your toothbrush isn’t part of a botnet. (Image: Shutterstock)

Forget worrying about Bolsheviks in the bathroom. Now we have to contend with our internet-connected toothbrushes being turned against us.

See Also: Live Webinar | Securing the Cloud: Mitigating Vulnerabilities for Government


Breathless reports in recent days have claimed 3 million IoT toothbrushes running Java have been remotely compromised and used to compromise the cyber hygiene of unsuspecting businesses via distributed denial-of-service attacks.


Just one problem: This tale has more holes in it than the teeth of kid with a 10-pack-a-day Gummy Bear habit.


The viral story originated in Swiss German-language daily newspaper Luzerner Zeitung. On Jan. 30, the paper set this scene: A woman blissfully brushes away, oblivious to the fact that her internet-connected toothbrush has been infected with malware, making it moonlight as one of millions of other toothbrushes controlled by a botnet, which the toothbrushes collectively harness to bring the website of an unsuspecting Swiss firm to its digital knees.


The story – as machine-translated by Google – claims “this actually happened” and quotes Switzerland-based Stefan Züger, Fortinet’s director of systems engineering, as saying: “Every device that is connected to the internet is a potential target – or can be misused for an attack.”


The report arrives on the heels of high-profile nuisance attacks against Switzerland’s federal government, based in Bern. The attacks last month were apparently timed to coincide with Ukrainian President Volodymyr Zelenskyy’s attendance at the annual World Economic Forum meeting in Davos.


The self-proclaimed Russian hacktivist group NoName057(16), aka NoName, claimed credit for the DDoS attacks, which the Luzerner Zeitung report referenced.


Whether or not a single smart toothbrush has ever been remotely compromised – never mind 3 million of them – remains to be seen, especially since no such devices appear to be designed to directly connect to the internet.


But NoName, which closely aligns itself with Moscow and may be run by Russia’s intelligence apparatus – is not letting the dust settle on this dental drama. British cybersecurity expert Kevin Beaumont spotted the group asking its followers via Telegram: “Who infected thousands of ‘smart’ toothbrushes with our software?”


The smart money answer remains: No one. “It takes 2 seconds to peel back the story to see if there’s anything reasonable there. There isn’t,” tweeted offensive security engineer Robert Graham.


“I have my doubts as well. I was not able to find any details anywhere – like brand, malware or target,” said Zurich-based Candid Wüest, vice president of product management at Acronis. “They only mention that it runs Java, which seems a bit overpowered for a toothbrush.”


While the botnet scenario is theoretically possible, “most smart toothbrushes I have seen are using Bluetooth Low Energy to connect to a base station or smartphone,” he told me. “Yes, there are some base stations with Alexa and WLAN integrated, but I doubt that really 3 million people have these and have them activated and exposed to the internet.”


Plenty of IoT devices are remotely compromised. Sometimes researches uncover vulnerabilities in IoT and find ways to take over or filch data from gadgets ranging from internet-connected vending machines and refrigerators to child-tracking smartwatches and cloud-connected stuffed animals (see: Yes, Unicorns With Bluetooth Problems Really Do Exist).


On the less esoteric front, multiple strains of malware continue to target consumer IoT devices running default passwords. Many of these are based on wormable Mirai malware, which is designed to create botnets out of Linux-based IoT devices.


Someone leaked the Mirai source code online before its three original authors pleaded guilty in 2017 to building the original botnet and using it to launch DDoS attacks. Fresh versions of the malware continue to debut and circulate, infecting digital video recorders, cameras, routers and more. The malware has also spawned multiple variants, including Okiru, Satori, Masuta and PureMasuta.


An increasing quantity of IoT devices either weren’t built to be secure or are old enough that they can no longer be secured – and they have enough computing power to be turned against us. This most recently can be seen in the FBI’s recent move to remotely nuke KV Botnet malware that it said Chinese cyberespionage teams had used to infect “hundreds” of Cisco and Netgear routers found in American homes and small businesses.


Hence, the risk posed by IoT devices being used to launch remote attacks continues to be real – but hackers aren’t turning our toothbrushes against us.


No one need brush in fear. Do it twice daily, and don’t forget to floss.


 

Reference

Denial of responsibility! TechCodex is an automatic aggregator of Global media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, and all materials to their authors. For any complaint, please reach us at – [email protected]. We will take necessary action within 24 hours.
DMCA compliant image

Leave a Comment