{"id":172207,"date":"2023-09-17T09:22:46","date_gmt":"2023-09-17T14:22:46","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/09\/iot-sparks-new-ddos-alert"},"modified":"2023-09-17T09:22:46","modified_gmt":"2023-09-17T14:22:46","slug":"iot-sparks-new-ddos-alert","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/09\/iot-sparks-new-ddos-alert","title":{"rendered":"IoT Sparks New DDoS Alert"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/iot-sparks-new-ddos-alert.jpg\"><\/a><\/p>\n<p>When the botnet floods the target with excessive requests, service failures occur which jeopardize the availability of the targeted system and even put the integrity of the whole infrastructure at risk. When aimed against essential infrastructures such as healthcare or transportation, the hazards go beyond financial and reputational harm to endangering people\u2019s lives.<\/p>\n<p><b>Incorporating IoT Devices into Botnets<\/b><\/p>\n<p>IoT devices that are <a href=\"https:\/\/www.g2.com\/articles\/iot-vulnerabilities\" rel=\"noopener\" target=\"_blank\">unpatched, unattended, or misconfigured<\/a>, or are already under botnet DDoS attack, are at risk of being incorporated into a botnet. To expand the botnet, an attacker hacks new IoT devices. This process involves two entities: the botnet itself and the loader server, a special server that infects other devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When the botnet floods the target with excessive requests, service failures occur which jeopardize the availability of the targeted system and even put the integrity of the whole infrastructure at risk. When aimed against essential infrastructures such as healthcare or transportation, the hazards go beyond financial and reputational harm to endangering people\u2019s lives. Incorporating IoT [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,45,1491],"tags":[],"class_list":["post-172207","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-finance","category-transportation"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/172207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=172207"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/172207\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=172207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=172207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=172207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}