3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (1)

It sounds more like science fiction than reality, but Swiss newspaperAargauer Zeitungreported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets -- transformed into soldiers in a botnet army -- allegedly knocked out a Swiss company for several hours, costing millions of euros in damages.

Or, did they? Sources, such as Bleeping Computerand Bleeping Media, found it hard to credit this toothsome tale. And now the security companyFortinet, which helped give the original story credence, is admitting that mistakes were made.

In a note to ZDNET, a Fortinet representative said, "To clarify, the topic of toothbrushes being used for DDoS attacks was presented during an interview as an illustration of a given type of attack, and it is not based on research from Fortinet or FortiGuard Labs. It appears ... the narrative on this topic has been stretched to the point where hypothetical and actual scenarios are blurred."

Also: Do you love or fear your smart home devices? For most Americans, it's both

The story had claimed that the compromised toothbrushes were running Java, a popular language for Internet of Things (IoT) devices. Once infected, a global network of malicious toothbrushes supposedly launched their successful attack.

The repurposed toothbrushes supposedly accomplished this by flooding the Swiss website with bogus traffic, effectively knocking services offline and causing widespread disruption.

Although this story wasn't real, the episode underlines the ever-expanding threat landscape as the IoT becomes increasingly embedded in our daily lives. "Smart" toothbrushes are now 10 years old. Devices that once seemed harmless and disconnected from the digital ecosystem are now potential entry points for cybercriminals. The implications are vast, not only for individual privacy and security but also for national infrastructure and economic stability.

As Stefan Zuger, director of system engineering in Fortinet's Swiss office, said, "Every device that is connected to the Internet is a potential target – or can be misused for an attack."

Anyone paying close attention to cybersecurity has known about this threat for years. As James Clapper, former US Director of National Intelligence, told us in 2016: "Devices, designed and fielded with minimal security requirements and testing, and an ever-increasing complexity of networks could lead to widespread vulnerabilities in civilian infrastructures and US government systems."

It's no longer "could." We're now living in homes filled with insecure IoT devices.

Also:This company says AI can help design sustainable smart home appliances

Why? As Mark Houpt, data center operator DataBank chief information security officer, explained, it's because many IoT devices are inherently insecure for two key reasons: Neglect and the lack of an interface upon which to add security and hardening measures. I mean, exactly how do you control your toothbrush's security setting? How do you add an antivirus program to your refrigerator?

You can't.

So, what can you do?

Well, for starters, as Zuger said, you can automatically update all your devices whenever an update is available "You can't update enough."

Also:The best smart home devices, tested and reviewed

You should also never charge your device at a public USB port. That same port that charges your gadget can also infect it.

I also suggest paying attention if your device suddenly starts losing power faster than normal. Sure, it may just be an aging battery, but it also could be malware running in the background.

You should also be wary of public Wi-Fi connections. The same connection that lets you watch a TikTok may also be loading malware on your smartphone.

While at your home, I urge you to set up a firewall on your Internet connection. If an attacker can't get to your smart toilet, it can't infect it. And, boy, isn't a malware-infected toilet an ugly thought?

Also: The best smart TVs you can buy

Finally -- and I'm quite serious about this -- don't buy an IoT-enabled device unless you have a real need for it. A smart TV? Sure, how else are you going to stream the Super Bowl? But a washing machine, an iron, a toothbrush? No. Just say no.

As we forge ahead into an increasingly connected future, let's ensure that our digital hygiene is as robust as our dental hygiene.

Security

  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next
3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

FAQs

Were 3 million smart toothbrushes used in a DDoS attack really? ›

Hackers didn't hack your smart toothbrush. What's happening: Swiss outlet Aargauer Zeitung published a story last week claiming that hackers had launched a distributed denial-of-service (DDoS) attack against roughly 3 million internet-connected toothbrushes, causing damage to the tune of millions of euros.

Were toothbrushes used in a DDoS attack? ›

Update 2 — 2/9/2024 6:30am PT: The security company at the nexus of the original report that three million toothbrushes were used in a DDOS attack has now retracted the story and claimed it was a result of a mistranslation — but according to the news outlet that published the initial report, that statement isn't true.

Were hacked toothbrushes used in cyber attack? ›

That's fiction. Last week, a Swiss-German news site published a story that three million smart toothbrushes had been hacked to conduct attacks against a company. But that wasn't the case. It was actually a hypothetical scenario, although cyber security experts say it is possible.

Who is the victim of DDoS attack? ›

DDoS attacks are usually only likely to affect business owners – particularly people in charge of large computer networks. However, they can also affect small businesses, blogs or personal websites. They might also bring down services that you depend on, like banking or email servers.

Why are DDoS attacks illegal? ›

The cumulative effect of DDoS attacks makes them substantially more destructive to web servers. DDoS attacks are severely detrimental to an online business because they completely stop the flow of traffic or slow a website down to the point of it being unusable.

What does DDoS do to WIFI? ›

DDoS Attack Meaning

DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.

What is a real world example of a DDoS attack? ›

One of the largest verifiable DDoS attacks on record targeted GitHub, a popular online code management service used by millions of developers. This attack reached 1.3 Tbps, sending packets at a rate of 126.9 million per second. The GitHub attack was a memcached DDoS attack, so there were no botnets involved.

How are 3 million hacked toothbrushes? ›

Yet, when the Swiss newspaper Aargauer Zeitung published a story that cybercriminals had infected 3 million internet-connected toothbrushes with malware, then used them to launch a cyberattack that downed a website for four hours and caused millions of dollars in damage, the tale was somehow irresistible.

Can a toothbrush be hacked? ›

Stefan Zuger from Fortinet advises protecting devices against malware and suspicious activity to stay safe from cybercriminals. Hackers have reportedly used millions of toothbrushes to launch a DDoS attack.

What is the most famous cyber attack? ›

The Most Notorious Cyberattacks in History
  • Robert Tappan Morris—The Morris Worm (1988) Robert Tappan Morris made the first internet computer worm in history. ...
  • MafiaBoy (2000) ...
  • Google China Attack (2009) ...
  • A Teenager Hacks the US Defense Department and NASA (1999) ...
  • Hacking a Radio Phone System to Win a Porsche (1995)

Can you fight a DDoS? ›

Preventing DDoS attacks can be challenging, particularly during high-traffic periods or across a vast and distributed network architecture. A truly proactive DDoS threat defense hinges on several key factors: attack surface reduction, threat monitoring, and scalable DDoS mitigation tools.

What are 3 reasons for DDoS attacks? ›

DDoS attacks can have many other motivations including political, hacktivist, terrorist, and business competition. Anyone with a financial or ideological motive can damage an organization by launching a DDoS attack against it.

How long do DDoS attacks last? ›

Denial-of-service attacks can last hours, or even days. These cyber assaults can also cause multiple disruptions throughout a singular attack.

What is the CIA triad for DDoS attacks? ›

CIA Triad and DDoS Attack

In cybersecurity, we think of the CIA triad in terms of types of attacks: Confidentiality: Is my information secret? Integrity: Is my information accurate and trustworthy? Availability: Can I get my information when and where I need it?

What is the oldest DDoS attack? ›

The First “DDoS Attack” – 1974

and a forerunner of many future multi-user computing systems. While we suspect DoS attacks happened in other systems, David's account was the earliest expressed. This author was part of similar “DoS the terminals” on school mainframe systems in 1976.

Is DDoS Guard real? ›

DDoS-Guard is a Russian Internet infrastructure company which provides DDoS protection and web hosting services.

References

Top Articles
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5865

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.