- cross-posted to:
- technology@lemmy.ml
- flatbield ( @furrowsofar@beehaw.org ) 13•1 year ago
Seems overblown. They said crypto, gaming, gambling, advertising, and marketing sites were the biggest targets. Not exactly critical stuff.
As far as botnets… Let orgs or agencies either patch the devices or disconnect them. Seems like there should be an agency that scans for problematic devices and takes action automatically.
- kostel_thecreed ( @kostel_thecreed@lemmy.ca ) 2•1 year ago
Good news, there are agencies which looks for these vulnerabilities and report the issues to manufacturers! But, usually the person who makes the botnet patches the vuln. after they infect the device so no one else can take control of it. So, unless the owner of the device apart of the botnet updates software after a fix is implemented and factory resets, nothing can be done to ‘remove’ the device from the botnet.
- emeralddawn45 ( @emeralddawn45@discuss.tchncs.de ) 2•1 year ago
Start blacklisting the devices then. People will learn quick that their device is infected if everything stops working for them lol.
- Hirom ( @Hirom@beehaw.org ) 3•1 year ago
That’s the way.
Finding out the person behind an online device then explain the importance of doing a reset+patch is hard enough for one person. It would have to be done for many thousandd of device on a regular basis. And many devices are setup and forgot, no one manages them.
A block may be an easier and better insentive. It would require an explicit error message. Eg “Connection blocked because malicious activity, likely from compromised device. Here are details about the compromised device model and how to patch…”
- flatbield ( @furrowsofar@beehaw.org ) 1•1 year ago
Not exactly true. Upstream could just disconnect the user for example at the ISP. One could also just disconnect whole countries if needed. We just do not take these these things seriously.
Similarly white hats could be scanning for vunerabilities and patching them when found before they could be exploited.
Similarly one could require all internet facing stuff to have an auto update feature.
Just saying many things could be done.
- Kresten ( @kresten@feddit.dk ) 5•1 year ago
It’s a sad development, but inevitable. Eventually you can’t discern malicious traffic and real user traffic, I’m pretty curious as to what will happen then
- Querk [they/them] ( @Querk@discuss.tchncs.de ) 3•1 year ago
Proof of work “toll” for each request or session seems like a good option.
- realslef ( @realslef@fedia.io ) 4•1 year ago
For everything except energy efficiency
- Hirom ( @Hirom@beehaw.org ) 3•1 year ago
Compromised devices can do work too, and it slows down everyone. Not sure it’s the right solution.
- Kresten ( @kresten@feddit.dk ) 1•1 year ago
You’re probably right
- shortwavesurfer ( @shortwavesurfer@monero.town ) 3•1 year ago
I kinda like how tor has done a proof of work before a request is acceptable