Skip to main content

Homeland Security warns some Sierra Wireless devices are subject to attack

A hand on a laptop in a dark surrounding.
Image used with permission by copyright holder
The U.S. Department of Homeland Security has issued a warning to owners of certain Sierra Wireless products. The devices are thought to be a target of Mirai, a piece of malware that has been steadily amassing a vast botnet over the past several months.

Mirai has largely been targeting Internet of Things devices, preying on the fact that many users leave their administrator login and password set to factory defaults. The Sierra Wireless products being affected are the LS300, the GX400, the GX/ES440, the GX/ES450, and the RV50, according to Hot For Security.

However, the alert issued by the Department of Homeland Security confirms that the issue is not a hardware or software vulnerability related to these devices. Users are advised to reboot the hardware, then follow steps to change their password to something more secure.

It is believed that the Mirai botnet was used in a major DDoS attack against security expert Brian Krebs. In September, Krebs reported that the source code for the malware had been made publicly available online, which may well be the root of recent attacks on Sierra Wireless hardware.

The Mirai botnet grows more powerful with every new device added to its ranks, so it is crucial as many users as possible are alerted to the straightforward process of securing their hardware. That is why the Department of Homeland Security saw fit to issue an alert, even though a relatively small sector of people will be affected.

A powerful botnet being operated by an unknown entity is a scary prospect, but fortunately it seems that hardware can be removed from its grasp fairly easily. If you own hardware that is susceptible to Mirai, make sure that you have taken the proper measures to keep it secure — in most cases, all it takes is a hard reset and a non-default password.

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more