Other information and services of the government: www.belgium.be   Logo van de Belgische federale overheid

Warning: new virus infects security cameras. Secure your smart devices.

Researchers have discovered a new virus that has infected 5,000 smart devices worldwide, including 372 devices in Belgium. These are mainly security cameras and network video recorders connected to the internet.  

Cyber criminals try to take over these devices by controlling them remotely. Together, these hacked devices form a botnet. In this case, the criminals use these devices to attack websites of telecom providers and gaming platforms, making them temporarily inaccessible. Often, owners do not even realize that their device has been infected and is being misused.  

What is the Internet of Things (IoT)?  

More and more devices in the home are connected to the internet: from smart doorbells and security cameras to thermostats and baby monitors. We call this the Internet of Things (IoT). These smart devices make our lives easier, but if they are not properly secured, they can easily be misused by cybercriminals.  

Why is this dangerous?  

Many people leave the default passwords on their devices or forget to perform updates. This makes it very easy for hackers to break in. Once a device is infected, it often becomes part of a botnet. This is a network of infected devices that can all be used simultaneously for cyber attacks. Such attacks can cause websites and online services to crash or become inaccessible. This is what is known as a DDOS attack 

How can you protect yourself?  

You can better secure your smart devices and home network with a few simple measures:  

Always replace the default passwords on your devices with strong passwords.  

Secure your home network, also useful if you work from home. Make sure you have a strong Wi-Fi password and, if possible, set up a separate network for your IoT devices.  

Run updates as soon as you receive a notification. Updates often solve security problems. Set up automatic updates if possible.  

Only give devices access to the data they really need. The less access, the less damage in the event of a hack.