The Mirai Botnet: How a Few College Kids Broke the Internet with Your Security Camera

On October 21, 2016, Twitter, Netflix, Reddit, Spotify, and CNN went dark simultaneously across the entire US east coast. Governments and security agencies braced for a nation-state cyberattack.

It was three college students trying to win at Minecraft.

The Short Version

Paras Jha, Josiah White, and Dalton Norman built Mirai to knock rival Minecraft servers offline — a petty competitive advantage in a game economy. The weapon they built was anything but petty.

Mirai worked by scanning the internet for IoT devices — security cameras, DVRs, home routers — still running factory default credentials. "admin/admin." "root/12345." "password." It tried 61 combinations. Most devices let it straight in.

Within 20 hours of release, Mirai had infected 65,000 devices, doubling in size every 76 minutes. At its peak: over 600,000 hijacked devices. A botnet more powerful than anything ever assembled.

Here's what it did with them:

  • September 2016: took down OVH, then the largest hosting provider in Europe, at a record-breaking 1 Tbps
  • September 20, 2016: hit security journalist Brian Krebs with 620 Gbps — the largest DDoS ever recorded against a single individual
  • October 21, 2016: attacked Dyn, a major DNS provider — taking down half the internet with it 🌐
  • After the source code was released: variants knocked all of Liberia offline and took down Deutsche Telekom's 900,000 customers

The FBI agent who cracked the case put it simply: "These kids are super smart, but they didn't do anything high level — they just had a good idea."

The good idea? Most IoT devices ship with default credentials that nobody ever changes. And nobody was checking.


💡 Why It Still Matters

Mirai's source code is public. It never went away — it spawned variants that are actively running today, targeting the same class of vulnerable devices. Your security camera, your smart router, your DVR: if it ships with default credentials and you haven't changed them, it's a potential recruit.

The lesson Mirai taught the IoT industry is still being learned. Regulatory pressure for secure-by-default credentials is growing. But millions of devices already in the field never got the memo.

The internet nearly broke because of a password that was "12345." That's not ancient history. It's Tuesday.

→ Full story: the Minecraft origin, the FBI investigation, the Dyn attack in detail, and what the IoT security industry learned: Read the deep dive


Follow for more IoT security deep dives — part of my ongoing 101-story series. 🔬 

Comments

Popular posts from this blog

How Smart Grids & IoT Are Powering a New Era of Energy Efficiency ⚡🌍

Miraikan: The Future Is Here

AI + IoT: The Power Duo Shaping the Future of Our Connected World