Reaper !!! The biggest cyber attack ever !?
“ Reaper ”, it’s a freaky name of a possible big cyber attack all around the world.
The check point IT community experts said that one million of smart things was controlled. By a remote control of this smart things (botnet), the hackers would to attack many internet servers located in the United States in the incoming months.
Once under control, these machines all connect to the same site. The idea being to disable most internet servers by drowning them under tens of thousands of requests. In high-tech jargon, this kind of attack is called DDoS. “It’s as if all the country was calling on the same mobile phone,” says Damien Bancal, a journalist from the Zataz site.
Until now, the malicious software “Reaper” would have infiltrated connected devices GoAhead, Netgear, D-Link, Jaws, Vacron, or Linksys. It is 70% of objects held by individuals according to Mohamed Boumediane, the boss of Ziwit, a start-up become European benchmark in cybersecurity. In addition to the connected speakers, objects as banal as internet boxes, televisions or alarms can be used to feed the army wanted to train hackers. In companies, centralized air conditioners or cameras are the first targets.
Ransoms and theft of personal data
Behind these maneuvers are – not surprisingly – economic interests. Indeed, the first targeted servers are those of cyber merchants. The purpose being to block their servers and make them sing by asking for a ransom.
Businesses are not the only targets. Individuals are also potential victims of these attacks. For example, a user who has entered a portion of his or her bank details – card number and expiry date – for online purchases runs a high risk. Because it is enough that his computer is infected so that hackers can remotely collect this bank data (the numbers of your credit card are usually kept once you have placed an order on an e-commerce site).
It will then be enough for these cybercriminals to enter the cryptogram – the 3 numbers on the back of the card – to multiply purchases at the expense of the user. The circle is a little technical but deserves to look. A cryptogram has only 999 possible combinations. Each connected object is programmed to compose a code. After 999 attempts, the correct code will necessarily be found. And the credit card of the particular hacked.
It’s hard to know how fast this malware is spreading. One of the most effective ways to protect yourself is to change the passwords of your connected devices regularly.