198 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Who wants to try a Domino server addin that stops Lockey viruses?
Fri, Mar 11th 2016 6
WordDOC Macro Killer
Wed, Jan 6th 2016 4
Have you been targeted by Fraud emails?
Thu, Dec 18th 2014 4
Poodle + Domino SSL = Mail Problems
Wed, Oct 22nd 2014 5
IBM and Apple focus on the Enterprise
Wed, Jul 16th 2014 5
CryptorBit Virus
Mon, May 5th 2014 4
Time-lapse of Product Showcase Taken from my GoPro Camera
Tue, Feb 4th 2014 2
Top 10
Who wants to try a Domino server addin that stops Lockey viruses?
Fri, Mar 11th 2016 6
IBM and Apple focus on the Enterprise
Wed, Jul 16th 2014 5
Poodle + Domino SSL = Mail Problems
Wed, Oct 22nd 2014 5
Virus Names translated from Chinese
Tue, Jan 7th 2014 5
CryptorBit Virus
Mon, May 5th 2014 4
Have you been targeted by Fraud emails?
Thu, Dec 18th 2014 4
Refrigerators Now Send Spam as Well as Keeping it Cold
Mon, Jan 20th 2014 4
WordDOC Macro Killer
Wed, Jan 6th 2016 4
Blocking EXE attachments is working great!
Fri, Dec 13th 2013 3
Increase in Virus Activity
Thu, Jan 9th 2014 3


Refrigerators Now Send Spam as Well as Keeping it Cold
Twitter Google+ Facebook LinkedIn Addthis Email Gmail Flipboard Reddit Tumblr WhatsApp StumbleUpon Yammer Evernote Delicious
Frank Paolino    

Refrigerators now do more than keep spam, that tasty treat,  cold, they also send spam, the electronic email version.

That is the story of a compromised refrigerator that sends cold "spam" to unsuspecting users via it's internet connection.

Viruses makers will try to add anything to their botnets, and the latest attack on "refrigerators" does not surprise me at all. The target of this attack was a refrigerator model running a flavor of Linux that had not been hardened or protected against malware, and was allegedly sending out lots of spam.


A picture named M2

There was no proof from Proofpoint of the actual source refrigerator in the article, making some at Ars Technica question the veracity of the story. Either way it is only a question of time before these Internet connected devices start doing more than laundry. With ipv6, which has 3.4 x 1038 addresses (that is 3,400 trillion  trillion  trillion addresses), which means any item can have an ip address. If there are soon 10 billion people in the world, we could tag more than 100 trillion trillion items each with an ipv6 address, so these won't run out unless we want to start tagging stars in the sky.

Make no mistake about it: The virus makers are targeting any Target (pun intended) that they can, in an attempt to:
  • Steal money
  • Steal your identity
  • Steal your wallet (bitcoin users know this problem very well)
  • Steal your data (credit card numbers, for example)
  • Hold you for Ransom

If these don't work, they will infect your device and use it to send more spam or malware.

The moral of the story is that in an always-connected world every device is contantly being probed for weaknesses to find an entry point to launch an attack.



---------------------
http://blog.maysoft.org/blog.nsf/d6plinks/FPAO-9FJSJZ
Jan 20, 2014
5 hits



Recent Blog Posts




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition