• kostel_thecreed@lemmy.ca
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Good news, there are agencies which looks for these vulnerabilities and report the issues to manufacturers! But, usually the person who makes the botnet patches the vuln. after they infect the device so no one else can take control of it. So, unless the owner of the device apart of the botnet updates software after a fix is implemented and factory resets, nothing can be done to ‘remove’ the device from the botnet.

      • Hirom@beehaw.org
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 year ago

        That’s the way.

        Finding out the person behind an online device then explain the importance of doing a reset+patch is hard enough for one person. It would have to be done for many thousandd of device on a regular basis. And many devices are setup and forgot, no one manages them.

        A block may be an easier and better insentive. It would require an explicit error message. Eg “Connection blocked because malicious activity, likely from compromised device. Here are details about the compromised device model and how to patch…”

    • flatbield@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Not exactly true. Upstream could just disconnect the user for example at the ISP. One could also just disconnect whole countries if needed. We just do not take these these things seriously.

      Similarly white hats could be scanning for vunerabilities and patching them when found before they could be exploited.

      Similarly one could require all internet facing stuff to have an auto update feature.

      Just saying many things could be done.