Hide N Seek, the malware that attacks the Smart home during the holidays – Macitynet.it
In summer, home security and user peace of mind entrusted to video surveillance systems and home monitoring via Smart devices. But cyber attacks don't go on vacation: Fortinet's FortiGuard Labs have indeed identified new variants of the Hide N Seek malware that targets the vulnerabilities of Smart Home devices.
- 1 What is Hide N Seek
- 2 What does he do
- 3 Tips for sheltering connected devices in your home
- 4 iPad Pro 2020 available on Amazon with ready to ship
- 5 Zoom: some conversations were mistakenly passed by Chinese servers
- 6 Facebook releases the Messenger app for macOS and Windows
- 7 Apple pays a $ 75,000 hacker to discover serious flaws in the iPhone and Mac
- 8 Italians besieged at home, Google data show social distancing in Italy and worldwide
- 9 The iPhone SE 2020 pre-orders expected today: price, colors and covers
- 10 Apple indicates the AirTags on video but have yet to be presented
- 11 Roidmi Nex 2 and Nex 2 Pro, from Xiaomi two new vertical vacuum cleaners
- 12 Cloudflare, controversy over the censorship of Family Filters on DNS
- 13 Kit for the Smart Home with five peripherals included in the flash offer at 55 euros
- 14 Apple Music grows faster than Spotify in 2019, but that's not enough
- 15 HomePod, special discount for employees: new model coming soon?
- 16 Undersea Solitaire Tripeaks a casual adventure for iPhone and Android
- 17 Zoom: some conversations were mistakenly passed by Chinese servers
- 18 TaoTronics BH22, headphones with active noise cancellation: last days 34.99 euros
- 19 Gocycle G3 the folding bike with pedal assistance that is managed from the iPhone
- 20 iPad Pro 2020 disables microphones when the case is closed
- 21 Ultimate guide: how to choose SD memory cards, micro SD cards and more
- 22 The best Lightning cables for iPhone and iPad
- 23 GaN power supplies and chargers, how they work and which to choose
- 24 The best chargers to quickly charge iPhone, iPad and Mac
- 25 Ultimate guide: how to choose SD memory cards, micro SD cards and more
- 26 Selective Time Machine backup, how to exclude some files
- 27 Ten hidden little news from macOS 10.15 Catalina
- 28 GaN power supplies and chargers, how they work and which to choose
- 29 10 useful tips for video calls between iPhone, iPad, Mac, PC, Android and Alexa
What is Hide N Seek
Hide N Seek (HNS) an IoT botnet that communicates in a complex and decentralized way – using personalized peer-to-peer communication – to implement a series of malicious activities. If initially it was addressed to routers, IP cameras and DVR systems for video surveillance, now it also targets home smart devices and cross-platform corporate databases.
<img class = "alignnone size-full wp-image-776458″ title=”Hide N Seek, the malware that attacks the Smart home during the holidays” alt=”Hide N Seek, the malware that attacks the Smart home during the holidays "width =" 1200 "height =" 800 "srcset =" https://www.macitynet.it/wp-content/uploads/2018/08/hidenseek00001. jpg 1200w, https://www.macitynet.it/wp-content/uploads/2018/08/hidenseek00001-480×320.jpg 480w, https://www.macitynet.it/wp-content/uploads/2018/08/ hidenseek00001-696×464.jpg 696w, https://www.macitynet.it/wp-content/uploads/2018/08/hidenseek00001-1068×712.jpg 1068w, https://www.macitynet.it/wp-content/uploads/ 2018/08 / hidenseek00001-630×420.jpg 630w "data-lazy-sizes =" (max-width: 1200px) 100vw, 1200px "src =" https://www.macitynet.it/wp-content/uploads/2018/ 08 / hidenseek00001.jpg”/>
What does he do
HNS attacks the heart of connected home systems that offer a wide range of control, monitoring and configuration options for all devices, becoming the access point for malware to hack into the home. According to experts, HNS samples have become increasingly resistant and are able to persist when the system is restarted.
From April onwards, HNS gradually added new exploits to its arsenal one at a time. The authors of HNS make sure every time the version is stable enough before incorporating new ones, to perform attacks targeting multiple platforms and devices and increase their propagation. At the moment, exploits have been tracked targeting Belkin, Netgear, Lynksys TP-Link and HomeMatic IoT devices.
<img class = "alignnone size-full wp-image-776460″ title=”Hide N Seek, the malware that attacks the Smart home during the holidays” alt=”Hide N Seek, the malware that attacks the Smart home during the holidays "width =" 1200 "height =" 675 "srcset =" https://www.macitynet.it/wp-content/uploads/2018/08/smarthome00001. jpg 1200w, https://www.macitynet.it/wp-content/uploads/2018/08/smarthome00001-480×270.jpg 480w, https://www.macitynet.it/wp-content/uploads/2018/08/ smarthome00001-696×392.jpg 696w, https://www.macitynet.it/wp-content/uploads/2018/08/smarthome00001-1068×601.jpg 1068w, https://www.macitynet.it/wp-content/uploads/ 2018/08 / smarthome00001-747×420.jpg 747w "data-lazy-sizes =" (max-width: 1200px) 100vw, 1200px "src =" https://www.macitynet.it/wp-content/uploads/2018/ 08 / smarthome00001.jpg”/>
Tips for sheltering connected devices in your home
- If not strictly necessary, avoid connecting IoT devices to the home LAN. For example, if you do not use the Smart functions of your TV, it is better not to connect it to your home Wi-Fi in order not to put it at risk of an attack.
- Update software and firmware. In most cases, hackers exploit vulnerabilities in device management software and firmware to attack them and thus take control of them. By downloading and installing the updates that software houses and manufacturers periodically release, you can improve the security level of your smart home.
<img class = "alignnone size-full wp-image-776459″ title=”Hide N Seek, the malware that attacks the Smart home during the holidays” alt=”Hide N Seek, the malware that attacks the Smart home during the holidays "width =" 1200 "height =" 436 "srcset =" https://www.macitynet.it/wp-content/uploads/2018/08/hidenseek00002. jpg 1200w, https://www.macitynet.it/wp-content/uploads/2018/08/hidenseek00002-480×174.jpg 480w, https://www.macitynet.it/wp-content/uploads/2018/08/ hidenseek00002-696×253.jpg 696w, https://www.macitynet.it/wp-content/uploads/2018/08/hidenseek00002-1068×388.jpg 1068w, https://www.macitynet.it/wp-content/uploads/ 2018/08 / hidenseek00002-1156×420.jpg 1156w "data-lazy-sizes =" (max-width: 1200px) 100vw, 1200px "src =" https://www.macitynet.it/wp-content/uploads/2018/ 08 / hidenseek00002.jpg”/>
- Create dedicated wireless networks. If you need to connect IoT devices to Wi-Fi, create at least one subnet dedicated exclusively to the Smart Home. This is a solution made possible by the latest generation routers and access points, which allows you to increase the security level of both the home automation and home LANs.
- Use a VPN. To prevent cybercriminals from intercepting communications, it is always advisable to use a VPN (Virtual Private Network) service that allows you to send and receive data and information in an encrypted and secure manner.
<img width = "218" height = "150" class = "entry-thumb" srcset = "https://www.macitynet.it/wp-content/uploads/2020/03/ipad-pro-2020-amazon- 218×150.jpg 218w, https://www.macitynet.it/wp-content/uploads/2020/03/ipad-pro-2020-amazon-480×330.jpg 480w, https://www.macitynet.it/wp- content / uploads / 2020/03 / ipad-pro-2020-amazon-696×479.jpg 696w, https://www.macitynet.it/wp-content/uploads/2020/03/ipad-pro-2020-amazon-1068×735 .jpg 1068w, https://www.macitynet.it/wp-content/uploads/2020/03/ipad-pro-2020-amazon-610×420.jpg 610w, https://www.macitynet.it/wp-content /uploads/2020/03/ipad-pro-2020-amazon-100×70.jpg 100w, https://www.macitynet.it/wp-content/uploads/2020/03/ipad-pro-2020-amazon.jpg 1200w "data-lazy-sizes =" (max-width: 218px) 100vw, 218px” alt=”iPad Pro 2020 available for order on Amazon: arriving Wednesday March 25th” title=”iPad Pro 2020 available on Amazon with ready shipment "src =" https://www.macitynet.it/wp-content/uploads/2020/03/ipad-pro-2020-amazon-218×150.jpg”/>