1. 9

  2. 2

    Once the device is rebooted it goes back to its unsecured state, complete with default passwords and a Telnet open to the world. To have a lasting effect, the firmware would need to be updated. It is extremely difficult to update the firmware on a large scale because the process is unique to each device and in some cases is not possible without physical access.

    Funny, it means that until someone find a way to collect all of these process, the hunt is still on.

    Actually, it will be more scary than funny if these guys start doing things other than DDoSs with these objects…

    1. 1

      Reminds me of that movie advertizing tag line, “Alien vs Predator: Whoever wins, we lose”