Smart appliances, including a refrigerator, used in an IoT-based spam attack

A report by Proofpoint Inc., a security-as-a-service provider, has revealed a spam attack that involved so-called Internet of Things, everyday devices that are Internet aware.

You knew it wasn’t going to be long before all those “smart” appliances became tools in the hands of hackers.

The spam attack involved simple everyday smart devices, from home-networking routers to at least one refrigerator. This is the first large-scale reported case, but you know for a certain that it won’t be the last.

According to the report:

The global attack campaign involved more than 750,000 malicious email communications coming from more than 100,000 everyday consumer gadgets such as home-networking routers, connected multi-media centers, televisions and at least one refrigerator that had been compromised and used as a platform to launch attacks.


The attack that Proofpoint observed and profiled occurred between December 23, 2013 and January 6, 2014, and featured waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting Enterprises and individuals worldwide. More than 25 percent of the volume was sent by things that were not conventional laptops, desktop computers or mobile devices; instead, the emails were sent by everyday consumer gadgets such as compromised home-networking routers, connected multi-media centers, televisions and at least one refrigerator. No more than 10 emails were initiated from any single IP address, making the attack difficult to block based on location – and in many cases, the devices had not been subject to a sophisticated compromise; instead, misconfiguration and the use of default passwords left the devices completely exposed on public networks, available for takeover and use.

You may read the complete report here.

Internet of Things spam attack

Related Posts

Should Truecrypt be audited? Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encry...
Memo to HP: A backdoor is not a vulnerability Technion, a blogger who maintains lolware.net, recently disclosed a backdoor in StoreOnce 4210 product, an HP storage hardware for enterprise users. ...
Technical recommendations for securing Hadoop The following are our security recommendations to address security issues with Hadoop and NoSQL database clusters. The last time we made recommend...
Google to Gmail users: Forget about privacy. It’s so dead! Here's a report from The Guardian. Yep, it's that same UK online news site that's been making headlines for more than a month. The report cites...
Mozilla is phasing out SHA-1 based signature algorithms Mozilla's Security Engineering Team has announced that they are proactively phasing out the SHA-1 based signature algorithms for digital certificates,...
NVIDIA Tegra Note NVIDIA Tegra Note is the latest offering in the tablet computing arena from NVIDIA. It is an Android OS-powered tablet platform that will be available...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*