IoT Devices Are Being Hacked By Lizard Squad To Execute DDoS Attacks

People who have been following the tech news may recall the name Lizard Squad. This hacker collective has been a major pain in the neck for computer users all over the world. But it looks like they are changing tactics. Instead of relying on computer botnets, they are now enslaving other internet-connected devices to wreak more havoc.

Lizard Squad Is Still On The Scene

While most people agree the Internet of Things is a magnificent concept, it also poses a significant security risk. The majority of Internet-connected devices is not equipped with proper security precautions. In theory, any device connected to the internet can be hacked and taken over by malicious individuals.

That seems to what Lizard Squad is showcasing already. The collective has been making a name for itself by using compromised computers to execute DDoS attacks around the world. But it looks like the Internet of Things is their new favorite target as of late. With millions of connected devices to choose from, creating a botnet has never been easier.

Over the past few months, Lizard Squad hacked CCTV cameras and webcams all over the world to execute its DDoS attacks. Targets ranged from banks to governments, and gaming sites to ISPs. Albeit internet-connected devices are not always as powerful as a computer, they are much easier to control remotely. Plus, a lot of less-powerful devices combined can still pack quite the punch.

Related Post

Top put this into perspective, some of the recent Lizard Squad attacks managed to drive 400 Gbps of data to specific websites and servers. That is quite a lot of computer requests to bring down any network, or at least cripple it severely. Interestingly enough, it remains unknown whether or not Lizard Squad is trying to force targets to pay up to get rid of the attacks altogether.

These attacks paint a worrisome picture for the future of Internet of Things security, though. The vast majority of devices will need to be made a lot more secure before they are actively used on the Internet. Computers are not safe from harm, either, though, as hacker collectives will try to exploit any weakness in any device.

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

The 190M Daily Squeeze: ZKP’s $1.6M Momentum Ranks It as the Best Presale Crypto for 10,000x Gains

The Zero Knowledge Proof (ZKP) presale auction has officially entered Stage 2, and for anyone…

5 hours ago

Stablecoin Supply Begins To Shrink After Months Of Growth

After months of steady expansion through 2025, stablecoin supply across the crypto market is now…

1 day ago

Bitwise Enters Onchain Finance As Morpho Vault Curator

Bitwise Asset Management has officially expanded deeper into decentralized finance by launching non-custodial onchain vault…

1 day ago

ZetaChain Unveils 2.0 Upgrade And Anuma Beta Release

ZetaChain has officially announced the launch of ZetaChain 2.0, alongside the beta release of Anuma,…

1 day ago

Massive Infostealer Database Exposes 149 Million Login Records

A massive unsecured database exposing roughly 149 million usernames and passwords surfaces online, triggering fresh…

3 days ago

HIP-3 Open Interest Surges To $790 Million As Hyperliquid Hits New Liquidity Milestone

Hyperliquid continues to reshape decentralized trading as HIP-3 open interest (OI) climbs to a fresh…

3 days ago