Home Business IT Security Internet of Things Internet of things-connected fridge implicated in botnet spam email attack

In a novel twist on cold calling, an Internet-connected fridge has been discovered as part of a botnet sending over 750,000 spam e-mails.

Do you keep your spam in the pantry? In an undesirable consequence of the move to "Internet of things" and so-called smart appliances, a refrigerator has been left out in the cold after being caught contributing to a botnet attack which generated over 750,000 spam e-mails.

The Internet of things supposedly brings convenience, allowing devices to call for service in the event of malfunction, or tweet energy usage updates to you, or advise that your milk is about to go off and you need to buy more.

Yet, with this rise of convenience comes the reality that devices are being placed online which typically have little to no malware protection. As has been seen in recent times, many home users do not even know to change the default passwords on their Internet-connected cameras. So too this lack of prudence now has extended to a kitchen near you.

Security firm Proofpoint discovere a botnet attack which ran over 23rd December 2014 and 6th January 2015 which incorporated over 100,000 devices. These devices included multimedia centres, routers, televisions and at least one refrigerator - all Internet-connected devices that proved to be explotable. Over 25% were not conventional computers or mobile devices.

The botnet sent out over 750,000 e-mails during this period, with careful coordination such that each device sent out no more than 10 e-mails.

Proofpoint noted the bulk of devices were not subjected to any sophisticated attack but simply were left open on public networks with default passwords.

Advocates of the Internet of things predict over 200 million devices will be Internet-connected by 2020 meaning that without prudence this problem will only increase.



Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.


Popular News




Guest Opinion


Sponsored News