Skip to Content

The Hackers’ New Weapons: Routers and Printers

Criminals are hijacking home and office routers and printers to help them overwhelm websites with traffic.
April 28, 2015

Attacks that take down websites by flooding them with traffic have been popular among computer criminals for years. Traditionally, such assaults are launched using PCs infected with malware. But two security companies say they have seen the emergence of a worrying new tactic: home routers, Internet-connected printers, and even webcams being used to knock targeted sites offline.

In a report released last week, Chinese security company NSFocus said that it had seen a significant increase in the use of networked home and office devices in so-called denial-of-service attacks. NSFocus get its data from hardware it sells to companies to defend against denial-of-service attacks. Its customers include the giant Chinese social networking company Tencent.

In December 2014, one of the largest denial-of-service attacks to date took down the online gaming services of Microsoft and Sony for several days. NSFocus researchers say their data indicates that 30 percent of the devices flooding the sites under attack were networked devices, mostly home and office routers. The attackers took control of the routers using malware that looked for devices with default passwords.

NSFocus also recorded an increase in a technique that can trick devices such as routers and printers into participating in a denial-of-service attack without having to compromise them with malware. Such attacks work by exploiting a communication protocol called SSDP, which many devices use to check in with the company that owns or operates them. The protocol is designed in a way that makes it possible to ask a device to send information to a different server. That feature can be used to stage a denial-of-service attack by directing many devices to repeatedly send information to a server running a particular website.

Rishi Agrawal, chief evangelist at NSFocus, says that the tactic is likely to become more common. Staging attacks that way can be easier to use than controlling compromised computers, and the supply of home and office devices that could be used is large and is likely to grow, he says.

When NSFocus researchers spent two days scanning the Internet for vulnerable hardware, they found seven million devices that could be used in the same way as the ones that helped bring down Microsoft and Sony.

Agrawal says techniques exist for filtering out attacks that use SSDP but they’re not widely used. He adds that attackers will also likely find other methods to use connected devices in denial-of-service attacks.

Mikko Hypponen, chief research officer of F-Secure, a security company based in Finland, highlighted the December attacks in a briefing with reporters Wednesday about recent trends in online security. They represent the first real evidence that criminals have found a profitable reason to hijack so-called “Internet of things” devices, a possibility people have warned about for years, he said.

So far criminals have had little incentive to compromise such devices at scale. But Hypponen thinks Internet of things gadgets such as TVs, thermostats, and cars could become a target of ransomware, which holds data hostage using encryption and is a huge problem on PCs (see “Holding Data Hostage: The Perfect Internet Crime”).

A form of ransomware that infects certain Internet-connected LG TVs has been found, but the technique hasn’t spread more widely yet. “An attack is only a good attack if it makes money,” said Hypponen.

Keep Reading

Most Popular

It’s time to retire the term “user”

The proliferation of AI means we need a new word.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Sam Altman says helpful agents are poised to become AI’s killer function

Open AI’s CEO says we won’t need new hardware or lots more training data to get there.

An AI startup made a hyperrealistic deepfake of me that’s so good it’s scary

Synthesia's new technology is impressive but raises big questions about a world where we increasingly can’t tell what’s real.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.