3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (1)

It sounds more like science fiction than reality, but Swiss newspaperAargauer Zeitungreported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets -- transformed into soldiers in a botnet army -- allegedly knocked out a Swiss company for several hours, costing millions of euros in damages.

Or, did they? Sources, such as Bleeping Computerand Bleeping Media, found it hard to credit this toothsome tale. And now the security companyFortinet, which helped give the original story credence, is admitting that mistakes were made.

In a note to ZDNET, a Fortinet representative said, "To clarify, the topic of toothbrushes being used for DDoS attacks was presented during an interview as an illustration of a given type of attack, and it is not based on research from Fortinet or FortiGuard Labs. It appears ... the narrative on this topic has been stretched to the point where hypothetical and actual scenarios are blurred."

Also: Do you love or fear your smart home devices? For most Americans, it's both

The story had claimed that the compromised toothbrushes were running Java, a popular language for Internet of Things (IoT) devices. Once infected, a global network of malicious toothbrushes supposedly launched their successful attack.

The repurposed toothbrushes supposedly accomplished this by flooding the Swiss website with bogus traffic, effectively knocking services offline and causing widespread disruption.

Although this story wasn't real, the episode underlines the ever-expanding threat landscape as the IoT becomes increasingly embedded in our daily lives. "Smart" toothbrushes are now 10 years old. Devices that once seemed harmless and disconnected from the digital ecosystem are now potential entry points for cybercriminals. The implications are vast, not only for individual privacy and security but also for national infrastructure and economic stability.

As Stefan Zuger, director of system engineering in Fortinet's Swiss office, said, "Every device that is connected to the Internet is a potential target – or can be misused for an attack."

Anyone paying close attention to cybersecurity has known about this threat for years. As James Clapper, former US Director of National Intelligence, told us in 2016: "Devices, designed and fielded with minimal security requirements and testing, and an ever-increasing complexity of networks could lead to widespread vulnerabilities in civilian infrastructures and US government systems."

It's no longer "could." We're now living in homes filled with insecure IoT devices.

Also:This company says AI can help design sustainable smart home appliances

Why? As Mark Houpt, data center operator DataBank chief information security officer, explained, it's because many IoT devices are inherently insecure for two key reasons: Neglect and the lack of an interface upon which to add security and hardening measures. I mean, exactly how do you control your toothbrush's security setting? How do you add an antivirus program to your refrigerator?

You can't.

So, what can you do?

Well, for starters, as Zuger said, you can automatically update all your devices whenever an update is available "You can't update enough."

Also:The best smart home devices, tested and reviewed

You should also never charge your device at a public USB port. That same port that charges your gadget can also infect it.

I also suggest paying attention if your device suddenly starts losing power faster than normal. Sure, it may just be an aging battery, but it also could be malware running in the background.

You should also be wary of public Wi-Fi connections. The same connection that lets you watch a TikTok may also be loading malware on your smartphone.

While at your home, I urge you to set up a firewall on your Internet connection. If an attacker can't get to your smart toilet, it can't infect it. And, boy, isn't a malware-infected toilet an ugly thought?

Also: The best smart TVs you can buy

Finally -- and I'm quite serious about this -- don't buy an IoT-enabled device unless you have a real need for it. A smart TV? Sure, how else are you going to stream the Super Bowl? But a washing machine, an iron, a toothbrush? No. Just say no.

As we forge ahead into an increasingly connected future, let's ensure that our digital hygiene is as robust as our dental hygiene.

Security

  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next
3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

FAQs

Were 3 million toothbrushes really used for a DDoS attack? ›

The three million toothbrush botnet story isn't true,” Kevin Beaumont, a reputable cybersecurity researcher wrote on Mastodon, later describing it as “total bollocks”.

Were millions of smart toothbrushes turned into botnets and used in DDoS attacks? ›

As many as three million smart toothbrushes were reportedly converted into a massive botnet to carry out a distributed denial of service (DDoS) attack against a Swiss company. According to Aargauer Zeitung, the cyberattack took down the company's website for several hours.

Were three million malware infected smart toothbrushes used in Swiss DDoS? ›

Update 2 — 2/9/2024 6:30am PT: The security company at the nexus of the original report that three million toothbrushes were used in a DDOS attack has now retracted the story and claimed it was a result of a mistranslation — but according to the news outlet that published the initial report, that statement isn't true.

What is the cyber attack with toothbrushes? ›

What's happening: Swiss outlet Aargauer Zeitung published a story last week claiming that hackers had launched a distributed denial-of-service (DDoS) attack against roughly 3 million internet-connected toothbrushes, causing damage to the tune of millions of euros.

Could millions of hacked toothbrushes be used in a cyber attack? ›

KGTV) — A story you may have seen claims millions of hacked toothbrushes were used in a Swiss cyber attack. That's fiction. Last week, a Swiss-German news site published a story that three million smart toothbrushes had been hacked to conduct attacks against a company. But that wasn't the case.

What is a toothbrush DDoS? ›

There was about a 24-hour period where many news outlets reported on a reported DDoS attack that involved a botnet made up of thousands of internet-connected toothbrushes, it all started with one international newspaper report, and then was aggregated to death and spread quickly on social media.

Do all DDoS attacks use a botnet? ›

A Denial of Service (DoS) attack involves a single machine used to either target a software vulnerability or flood a targeted resource with packets, requests or queries. A DDoS attack, however, uses multiple connected devices—often executed by botnets or, on occasion, by individuals who have coordinated their activity.

Are botnets used for DDoS attacks? ›

The term botnet is a portmanteau from the words robot and network and each infected device is called a bot. Botnets can be designed to accomplish illegal or malicious tasks including sending spam, stealing data, ransomware, fraudulently clicking on ads or distributed denial-of-service (DDoS) attacks.

What is the world's most murderous malware? ›

Triton is malware first discovered at a Saudi Arabian petrochemical plant in 2017. It can disable safety instrumented systems, which can then contribute to a plant disaster. It has been called "the world's most murderous malware."

What was the biggest hack in cybersecurity history? ›

Biggest Cyber Attacks in History
  • Marriott Hotel Data Breach. ...
  • WannaCry Ransomware. ...
  • Ukraine Power Grid Attack. ...
  • The 2014 Yahoo Attack. ...
  • Adobe Cyber Attack. ...
  • The PlayStation Network Attack. ...
  • Estonia Cyber Attack. ...
  • The NASA Cyber Attack.
Jan 23, 2024

What does a smart toothbrush do? ›

Smart toothbrushes capture brushing data through built-in smart sensors in the toothbrush head. These sensors analyze brush head pressure on the teeth, coverage, brushing duration and other inputs in real-time. They send that data to a connected device where it is analyzed.

Can an electric toothbrush be hacked? ›

According to a report by the Aargauer Zeitung (spotted by Tom's Hardware), hackers infected nearly three million electric toothbrushes to turn them into botnets. The report also notes that this army of connected dental cleansing tools was used in a DDoS attack on a Swiss company's website.

What is the most famous cyber attack? ›

The Most Notorious Cyberattacks in History
  • Robert Tappan Morris—The Morris Worm (1988) Robert Tappan Morris made the first internet computer worm in history. ...
  • MafiaBoy (2000) ...
  • Google China Attack (2009) ...
  • A Teenager Hacks the US Defense Department and NASA (1999) ...
  • Hacking a Radio Phone System to Win a Porsche (1995)

Are cyber attacks illegal? ›

The federal Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, is the primary federal statutory mechanism for prosecuting cybercrime, including hacking, and also applies to some related extortionate crimes such as in the context of ransomware.

How many computers are typically used in a DDoS attack? ›

A DDoS attack uses more than one unique IP address or machines, often from thousands of hosts infected with malware.

What is a real life DDoS attack? ›

In a distributed denial-of-service (DDoS) attack, multiple devices are used to overwhelm a targeted server with requests and take web applications offline. Some of the biggest DDoS attacks have made major tech headlines.

What is used to carry out DDoS attacks? ›

Attackers use malware and other techniques to compromise a device, turning it into a “zombie” in the attacker's botnet. Botnets enable attackers to carry out DDoS attacks by harnessing the power of many machines and obscuring the source of the traffic.

What do hackers use to DDoS? ›

DDoS attacks are carried out with networks of Internet-connected machines. These networks consist of computers and other devices (such as IoT devices)which have been infected with malware, allowing them to be controlled remotely by an attacker.

Top Articles
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6008

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.