Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

@jeansburger@lemmy.world avatar

jeansburger

@jeansburger@lemmy.world

This profile is from a federated server and may be incomplete. Browse more on the original instance.

jeansburger ,
@jeansburger@lemmy.world avatar

It's definitely been popped. Rip.

jeansburger ,
@jeansburger@lemmy.world avatar

It's been hacked, the light bulb is likely part of some botnet or under an attacker's control directly. Which is why it's sending that much data continuously. IoT/smart devices don't send a lot of data in this sort of volume as most of the time they're idle and maybe send a heartbeat or status update every once in a while to prove they're alive.

This is what is called an indicator of compromise or IoC, it's some behavior or pattern that can be used to determine what is happening or who is the one doing the attacking.

Likely OP would need to do some analysis to be able to get attribution unless it's a very well known botnet actor in which case attribution is fairly straightforward.

jeansburger ,
@jeansburger@lemmy.world avatar

You're aware that you can send whatever traffic you want over any port right? Using 123/udp for NTP is just convention. A light bulb that is updating its time over Tor is suspect. TP-Link would have their own infrastructure or use public pools to update the device's time.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • incremental_games
  • meta
  • All magazines