HomeNewsOpinionAI: Digital zombies may already be in your home

AI: Digital zombies may already be in your home

Botnets that turn your gadgets into digital zombies aren’t going to attract the same attention as a chatbot or automated photo generator, nor the same level of fearmongering among AI skeptics. Every device with a processor, memory and an internet connection is a potential bot, which means they can be weaponised against us.

June 15, 2023 / 10:12 IST
Story continues below Advertisement
artificial intelligence
While botnets can run on desktop and laptop PCs, internet-connected devices are a better choice because they’re subject to a much lower level of scrutiny.

All the hand-wringing over the integration of generative artificial intelligence may be glossing over another type of bot that’s already causing damage in our daily lives: Growing armies of infected internet-connected devices.

Botnets running automated software have existed for two decades. Early variants ran largely on Windows-based PCs and were used to send spam. Now they’re far more stealthy and ubiquitous. In fact, there’s a good chance a bot has already been installed in your home. The number of network-connected gadgets deployed to conduct mass attacks has escalated over the past year, Nokia Oyj said in a recent report, and they’re being used to shutter websites, hack banking systems, close hospitals and cut off communications services.

Story continues below Advertisement

Internet cameras — used for household security, to monitor the baby, or keep tabs on the dog — are a common target. As are routers that sit in almost every home, largely forgotten by their owners. Just in the past two months, models from Taiwan’s Zyxel and Chinese firm TP-Link, two of the largest providers of consumer-level networking equipment, were identified as vulnerable to malicious code. Both have since issued advisories for customers to update their software.

The process of gathering infected devices into a network of bots is remarkably straightforward. First, a nefarious actor scans the internet for insecure gadgets. Since every network connection has a unique address, automated software need only trawl through various possibilities to look for a valid result — similar to robocallers dialling random phone numbers.