3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (1)

It sounds more like science fiction than reality, but Swiss newspaperAargauer Zeitungreported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets -- transformed into soldiers in a botnet army -- allegedly knocked out a Swiss company for several hours, costing millions of euros in damages.

Or, did they? Sources, such as Bleeping Computerand Bleeping Media, found it hard to credit this toothsome tale. And now the security companyFortinet, which helped give the original story credence, is admitting that mistakes were made.

In a note to ZDNET, a Fortinet representative said, "To clarify, the topic of toothbrushes being used for DDoS attacks was presented during an interview as an illustration of a given type of attack, and it is not based on research from Fortinet or FortiGuard Labs. It appears ... the narrative on this topic has been stretched to the point where hypothetical and actual scenarios are blurred."

Also: Do you love or fear your smart home devices? For most Americans, it's both

The story had claimed that the compromised toothbrushes were running Java, a popular language for Internet of Things (IoT) devices. Once infected, a global network of malicious toothbrushes supposedly launched their successful attack.

The repurposed toothbrushes supposedly accomplished this by flooding the Swiss website with bogus traffic, effectively knocking services offline and causing widespread disruption.

Although this story wasn't real, the episode underlines the ever-expanding threat landscape as the IoT becomes increasingly embedded in our daily lives. "Smart" toothbrushes are now 10 years old. Devices that once seemed harmless and disconnected from the digital ecosystem are now potential entry points for cybercriminals. The implications are vast, not only for individual privacy and security but also for national infrastructure and economic stability.

As Stefan Zuger, director of system engineering in Fortinet's Swiss office, said, "Every device that is connected to the Internet is a potential target – or can be misused for an attack."

Anyone paying close attention to cybersecurity has known about this threat for years. As James Clapper, former US Director of National Intelligence, told us in 2016: "Devices, designed and fielded with minimal security requirements and testing, and an ever-increasing complexity of networks could lead to widespread vulnerabilities in civilian infrastructures and US government systems."

It's no longer "could." We're now living in homes filled with insecure IoT devices.

Also:This company says AI can help design sustainable smart home appliances

Why? As Mark Houpt, data center operator DataBank chief information security officer, explained, it's because many IoT devices are inherently insecure for two key reasons: Neglect and the lack of an interface upon which to add security and hardening measures. I mean, exactly how do you control your toothbrush's security setting? How do you add an antivirus program to your refrigerator?

You can't.

So, what can you do?

Well, for starters, as Zuger said, you can automatically update all your devices whenever an update is available "You can't update enough."

Also:The best smart home devices, tested and reviewed

You should also never charge your device at a public USB port. That same port that charges your gadget can also infect it.

I also suggest paying attention if your device suddenly starts losing power faster than normal. Sure, it may just be an aging battery, but it also could be malware running in the background.

You should also be wary of public Wi-Fi connections. The same connection that lets you watch a TikTok may also be loading malware on your smartphone.

While at your home, I urge you to set up a firewall on your Internet connection. If an attacker can't get to your smart toilet, it can't infect it. And, boy, isn't a malware-infected toilet an ugly thought?

Also: The best smart TVs you can buy

Finally -- and I'm quite serious about this -- don't buy an IoT-enabled device unless you have a real need for it. A smart TV? Sure, how else are you going to stream the Super Bowl? But a washing machine, an iron, a toothbrush? No. Just say no.

As we forge ahead into an increasingly connected future, let's ensure that our digital hygiene is as robust as our dental hygiene.

Security

  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next
3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

FAQs

Were 3 million smart toothbrushes used in DDoS? ›

Lessons learned last week after false reports that 3 million smart toothbrushes were compromised and used in a DDoS attack went viral! The story of 3 million “hacked” smart toothbrushes used in a DDoS attack quickly went viral last week, only to be proven false.

Were three million malware infected smart toothbrushes used in Swiss DDoS? ›

Update 2 — 2/9/2024 6:30am PT: The security company at the nexus of the original report that three million toothbrushes were used in a DDOS attack has now retracted the story and claimed it was a result of a mistranslation — but according to the news outlet that published the initial report, that statement isn't true.

What is a toothbrush DDoS? ›

There was about a 24-hour period where many news outlets reported on a reported DDoS attack that involved a botnet made up of thousands of internet-connected toothbrushes, it all started with one international newspaper report, and then was aggregated to death and spread quickly on social media.

What is the cyber attack with toothbrushes? ›

Hackers didn't hack your smart toothbrush. What's happening: Swiss outlet Aargauer Zeitung published a story last week claiming that hackers had launched a distributed denial-of-service (DDoS) attack against roughly 3 million internet-connected toothbrushes, causing damage to the tune of millions of euros.

Were millions of smart toothbrushes turned into botnets and used in DDoS attacks? ›

As many as three million smart toothbrushes were reportedly converted into a massive botnet to carry out a distributed denial of service (DDoS) attack against a Swiss company. According to Aargauer Zeitung, the cyberattack took down the company's website for several hours.

Are DDoS attacks real? ›

In a distributed denial-of-service (DDoS) attack, multiple devices are used to overwhelm a targeted server with requests and take web applications offline. Some of the biggest DDoS attacks have made major tech headlines.

What was the biggest hack in cybersecurity history? ›

Biggest Cyber Attacks in History
  • Marriott Hotel Data Breach. ...
  • WannaCry Ransomware. ...
  • Ukraine Power Grid Attack. ...
  • The 2014 Yahoo Attack. ...
  • Adobe Cyber Attack. ...
  • The PlayStation Network Attack. ...
  • Estonia Cyber Attack. ...
  • The NASA Cyber Attack.
Jan 23, 2024

Why does my Oral B electric toothbrush have Bluetooth? ›

However, with location sensors, a Bluetooth toothbrush can keep track of where you've brushed already, and alert you if there's a tooth or section of your mouth that hasn't been properly cleaned yet.

What does a smart toothbrush do? ›

As the name suggests, a smart toothbrush is enabled with a motor that tells you the brush's position, speed, gives feedback and tells you how to improve oral hygiene. At the heart of most smart toothbrushes is a sonic motor and sensors attached at the head of the brush, which vibrates to effectively clean your teeth.

How does DDoS actually work? ›

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

What does DDoS do to WIFI? ›

DDoS Attack Meaning

DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.

Is DDoS a threat? ›

Types of DDoS Attacks

DDoS attacks are an evolving threat, and a variety of techniques can be used to carry them out. Some examples of common DDoS threats include: Amplification Attacks: Some services, such as DNS, have responses that are much larger than the corresponding request.

What is the 3 million smart toothbrush hack? ›

Yet, when the Swiss newspaper Aargauer Zeitung published a story that cybercriminals had infected 3 million internet-connected toothbrushes with malware, then used them to launch a cyberattack that downed a website for four hours and caused millions of dollars in damage, the tale was somehow irresistible.

Could millions of hacked toothbrushes be used in a cyber attack? ›

KGTV) — A story you may have seen claims millions of hacked toothbrushes were used in a Swiss cyber attack. That's fiction. Last week, a Swiss-German news site published a story that three million smart toothbrushes had been hacked to conduct attacks against a company. But that wasn't the case.

Can an electric toothbrush be hacked? ›

According to a report by the Aargauer Zeitung (spotted by Tom's Hardware), hackers infected nearly three million electric toothbrushes to turn them into botnets. The report also notes that this army of connected dental cleansing tools was used in a DDoS attack on a Swiss company's website.

What is used to carry out DDoS attacks? ›

Attackers use malware and other techniques to compromise a device, turning it into a “zombie” in the attacker's botnet. Botnets enable attackers to carry out DDoS attacks by harnessing the power of many machines and obscuring the source of the traffic.

What do hackers use to DDoS? ›

DDoS attacks are carried out with networks of Internet-connected machines. These networks consist of computers and other devices (such as IoT devices)which have been infected with malware, allowing them to be controlled remotely by an attacker.

What do DDoS attacks use? ›

Botnets, which are vast networks of computers, can be used to wage DDoS attacks. They are usually composed of compromised computers (e.g., IoT devices, servers, workstations, routers, etc.), or zombies, that are controlled by a central server. Attackers don't necessarily need a botnet to conduct a DDoS attack.

How many toothbrushes are wasted each year? ›

Globally, it is estimated that over 23 billion plastic toothbrushes are discarded every year, according to a report by the Zero Waste Week campaign. This number is expected to increase in the future with the growing population and the increasing use of disposable plastics.

References

Top Articles
Latest Posts
Article information

Author: Moshe Kshlerin

Last Updated:

Views: 6630

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Moshe Kshlerin

Birthday: 1994-01-25

Address: Suite 609 315 Lupita Unions, Ronnieburgh, MI 62697

Phone: +2424755286529

Job: District Education Designer

Hobby: Yoga, Gunsmithing, Singing, 3D printing, Nordic skating, Soapmaking, Juggling

Introduction: My name is Moshe Kshlerin, I am a gleaming, attractive, outstanding, pleasant, delightful, outstanding, famous person who loves writing and wants to share my knowledge and understanding with you.