Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real (2024)

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real (1)

Update 2 — 2/9/2024 6:30am PT: The security company at the nexus of the original report that three million toothbrushes were used in a DDOS attack has now retracted the story and claimed it was a result of a mistranslation — but according to the news outlet that published the initial report, that statement isn't true. The reports of this story are not based on a mistranslation by the media. The publication claims Fortinet presented the story as having actually happened and approved the text of the article, which had been submitted to Fortinet prior to publication.

Here's the Aargauer Zeitung's (the source of the story) statement on the matter (via Google Translate):

What the Fortinet headquarters in California is now calling a “translation problem” sounded completely different during the research: Swiss Fortinet representatives described the toothbrush case as a real DDoS at a meeting that discussed current threats -Attack described.

Fortinet provided specific details: information about how long the attack took down a Swiss company's website;an order of magnitude of how great the damage was.Fortinet did not want to reveal which company it was out of consideration for its customers.

The text was submitted to Fortinet for verification before publication.The statement that this was a real case that really happened was not objected to.

Fortinet's global management has now backtracked on its statement, which was sent to various international media outlets.The company also failed to send this to CH Media.We have not yet received any further statements from Fortinet."

EDIT 2/7/2024 — 3:30pm PT: Fortinet sent us a statement indicating that the report of the toothbrush attack is inaccurate:

"To clarify, the topic of toothbrushes being used for DDoS attacks was presented during an interview as an illustration of a given type of attack, and it is not based on research from Fortinet or FortiGuard Labs. It appears that due to translations the narrative on this topic has been stretched to the point where hypothetical and actual scenarios are blurred." - Fortinet.

The original text of the source report read:

“She's in the bathroom at home, but she's part of a large-scale cyber attack. The electric toothbrush is programmed with Java, and criminals have unnoticed installed malware on it - like on 3 million other toothbrushes. One command is enough and the remote-controlled toothbrushes simultaneously access the website of a Swiss company. The site collapses and is paralyzed for four hours. Millions of dollars in damage is caused.

This example, which seems like a Hollywood scenario, actually happened. It shows how versatile digital attacks have become.” [Emphasis Added]

A German-language outlet reported on the story as having "actually happened," indicating the translation is accurate, and multiple German speakers have confirmed that the passage saying the attack "actually happened" is an accurate translation. It remains to be seen if Aargauer Zeitung (the original source) will issue a correction.

Original article:

According to a recent report published by the Aargauer Zeitung (h/t Golem.de), around three million smart toothbrushes have been infected by hackers and enslaved into botnets. The source report says this sizable army of connected dental cleansing tools was used in a DDoS attack on a Swiss company’s website. The firm’s site collapsed under the strain of the attack, reportedly resulting in the loss of millions of Euros of business.

In this particular case, the toothbrush botnet was thought to have been vulnerable due to its Java-based OS. No particular toothbrush brand was mentioned in the source report. Normally, the toothbrushes would have used their connectivity for tracking and improving user oral hygiene habits, but after a malware infection, these toothbrushes were press-ganged into a botnet.

Stefan Züger from the Swiss branch of the global cybersecurity firm Fortinet provided the publication with a few tips on what people could do to protect their own toothbrushes – or other connected gadgetry like routers, set-top boxes, surveillance cameras, doorbells, baby monitors, washing machines, and so on.

“Every device that is connected to the Internet is a potential target – or can be misused for an attack,” Züger told the Swiss newspaper. The security expert also explained that every connected device was being continually probed for vulnerabilities by hackers, so there is a real arms race between device software/firmware makers and cyber criminals. Fortinet recently connected an ‘unprotected’ PC to the internet and found it took only 20 minutes before it became malware-ridden.

We don’t have the finer-grained details of the specific Swiss company targeted and suffered from the extremely costly DDoS attack. However, it is common for malicious actors to issue threats with monetary demands attached before weaponizing their DDoS zombie army. Perhaps the Swiss firm refused to pay up, or perhaps the malicious actors instigated this attack to show their muscle (teeth?) ahead of making any demands.

Though we don’t have the finer details of the DDoS story, it serves as yet another warning for device owners to do their best to keep their devices, firmware, and software updated; monitor their networks for suspicious activity; install and use security software; and follow network security best practices.

We've reached out to Fortinet for comment and will update this story as necessary.

Note: This article title originally read "Three million malware-infected smart toothbrushes used in Swiss DDoS attacks — botnet causes millions of euros in damages," but we altered that to represent the new developments.

Stay on the Cutting Edge

Join the experts who read Tom's Hardware for the inside track on enthusiast PC tech news — and have for over 25 years. We'll send breaking news and in-depth reviews of CPUs, GPUs, AI, maker hardware and more straight to your inbox.

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real (2)

Mark Tyson

Freelance News Writer

Mark Tyson is a Freelance News Writer at Tom's Hardware US. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.

More about networking

Wi-Fi jamming to knock out cameras suspected in nine Minnesota burglaries -- smart security systems vulnerable as tech becomes cheaper and easier to acquireAmazon’s new AWS charge for using IPv4 is expected to rake in up to $1B per year — change should speed IPv6 adoption

Latest

Arm, Samsung working together on next-gen 2nm chips — will co-optimize Cortex-A and Cortex-X cores for gate-all-around transistors
See more latest►

59 CommentsComment from the forums

  • PEnns

    Somebody remind please, again: Why does something like a toothbrush need to be connected??

    People are really asking for trouble with this kind of "let's connect everything...because it's so cool"!

    Reply

  • peachpuff

    PEnns said:

    Somebody remind please, again: Why does something like toothbrush need to be connected??

    People are really asking for trouble with this kind of "let's connect everything...because it's so cool"!

    To get on the toothbrush leader board... duh.

    Reply

  • Phaaze88

    'Smart' toothbrushes... holy crap, humanity.
    Insert that saying about, 'because we can, doesn't mean we should'.

    Replace the word smart with dumb.

    Reply

  • chaz_music

    In general if the product name has "smart" as part of its description, you should be very wary.

    The amount of engineering effort needed to make IoT devices truly secure on the Internet is substantial, and many times the engineering team is rather green and not knowing what they don't know. Add to this that many companies will outsource their product development to design groups only based upon cost of the project, you end up with catastrophes like this story. Even larger companies like HP have had problems with IoT printers and they had to go through growing pains to get the security right, with lots and lots of reuse of code, checks, etc. And most design teams are only cost focused, and don't want to add the cost of using more mature RF/networking products with the included code stacks such as by TI, Laird, Qualcomm, NXP, etc.

    So far, I have read about or myself found compromised devices in nearly all market areas: garage door openers, refrigerator, printers (why have Internet printing??!), smart doorbell cameras with off site recording, inexpensive network switches, smart LED lights (often color changing types), cars, RVs, phones (my goodness, that just makes you want to say damnit!), and now toothbrushes. And the hacked system vector is not always WiFi, as there are many other RF systems with another popular one to goof up being Bluetooth. The first automotive Bluetooth systems could be easily compromised, with one car type being used in a proof of concept in which the car was controlled by a passing car and the brakes were locked up while the car was traveling at highway speeds, triggering the anti lock brakes. And think about the Hyundai and Kia vehicles that can easily be stolen with a USB device. Same stuff.

    One of my biggest scare was not even with an RF based device but instead an Ethernet connected SCADA device from many years ago. It had a huge installed base, and it was sending data back on forth through the network using ... ASCII. Yep. And it was SCADA. Used in power plants, substations, transformers, generators, ...

    So the culprits are:
    1. Businesses only counting R&D and BOM costs, with virtually no consequence for poor security quality.
    2. Complacent and less knowledgeable engineers who are completely in charge of making serious decisions about cost vs. security.
    3. Designing IoT tech into devices and leaving the update complexity up to the user. In my opinion, the user should never be required to be in the technology loop to make their devices safe. This is not the same as when it is used based upon common knowledge (driving a car, drinking hot coffee).

    The expected long term fix for industrialized nations is going to be more safety agency regulations, So think of UL in the US and CE/IEC in Europe. These protect the consumer from poorly designed products, but these always add cost (no free lunch). I hate going in that direction because it will cause many clever products to go away, and others to never come to market.

    Reply

  • Murissokah

    Not trying to pick on Java, but why do you need Java on a toothbrush?

    Reply

  • Giroro

    Murissokah said:

    Not trying to pick on Java, but why do you need Java on a toothbrush?

    That ones easy: Because it's cheaper to have first-year computer scientists ridiculously overbuild the system with off the shelf demo code than to hire electronics engineers who know how to write efficient firmware.
    The toothbrush probably has (and maybe needs) a multi-core ARM CPU as well, because you can just pass that extra $1 in hardware costs off to the customer in the $300+ asking price I know Philips/Oral-B charges for the smart version of a toothbrush with near identical brushing performance to the $30 non-smart version.

    Reply

  • newtechldtech

    PEnns said:

    Somebody remind please, again: Why does something like toothbrush need to be connected??

    People are really asking for trouble with this kind of "let's connect everything...because it's so cool"!

    to sell them expensive 10 times the cost. it is all abut the $ and fooling the masses

    Reply

  • Giroro

    I sort-of understand how a marketing executive could want the company to sell a Bluetooth toothbrush.
    App tracking enabling access to a customer's sellable information, a branded billboard app icon on the users phone, etc etc. All the usual reasons to have an app. You can sell it to customers as having a fancy timer or whatever. I kinda get it.

    But why in the world would they pay engineers to enable wifi in the thing? It's probably built into their SoC, but like this has to be enabled by accident, right?
    This is some kind of backdoor thing?
    What's the selling point, revenue stream, or perceived value to the customer? You already have all you can get from Bluetooth, so why spend money on dev time to add in menus and get the wifi working?

    Reply

  • voodoochicken

    Watch out for those IoT Swiss Army Knives

    Reply

  • evdjj3j

    Smart toothbrushes for dumb people.

    Reply

Most Popular
Elon Musk reminisces about the time Jensen Huang donated a DGX-1 to OpenAI, shares photo gallery

By Mark Tyson

Not all RTX 40-series Super GPUs use the new 12V-2x6 connector — new images of 16-pin "H++" power connector emerge

By Aaron Klotz

Crucial takes aim for the sweet spot with DDR5 Pro Memory Overclocking Edition running at DDR5-6000

By Zhiye Liu

Scammer gets creative and ships women's shoes instead of Nvidia RTX 3060 Ti

By Zhiye Liu

Dutch government minister talks about China's military advantage — May point to stricter sanctions in the future

By Anton Shilov

GlobalFoundries gets 1.5 billion from CHIPS fund, $600 million from NY state

By Anton Shilov

Wyze security failure let 13,000 customers see into other users' homes

By Ash Hill

Following reports indicating a Q1 2025 Nintendo Switch 2 release, Nintendo's JP stock drops by over 5 percent

By Christopher Harper

Show off your CPU and M.2 SSDs to your friends with these $15 stands

By Zhiye Liu

Your fingerprints can be recreated from the sounds made when you swipe on a touchscreen — Chinese and US researchers show new side channel can reproduce fingerprints to enable attacks

By Mark Tyson

Reddit reportedly selling its users' content to an AI company for $60 million per year

By Christopher Harper

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real (2024)

FAQs

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real? ›

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real. Dental IoT devices caused millions of Euros in damages for Swiss company, says report.

What is the toothbrush denial of service attack? ›

There was about a 24-hour period where many news outlets reported on a reported DDoS attack that involved a botnet made up of thousands of internet-connected toothbrushes, it all started with one international newspaper report, and then was aggregated to death and spread quickly on social media.

What companies are affected by DDoS attacks? ›

Another massive DDoS attack was directed at Dyn, a major DNS provider, in October of 2016. This attack was devastating and created disruption for many major sites, including Airbnb, Netflix, PayPal, Visa, Amazon, The New York Times, Reddit, and GitHub. This was done using malware called Mirai.

Were 3 million smart toothbrushes just used in a DDoS attack? ›

There weren't really 3 million Internet-connected toothbrushes accessing the website of a Swiss company in a DDoS attack that did millions of dollars of damage. The toothbrush botnet was just a hypothetical example that some journalists wrongly interpreted as having actually happened.

Were three million malware infected smart toothbrushes used in Swiss DDoS attacks? ›

What's happening: Swiss outlet Aargauer Zeitung published a story last week claiming that hackers had launched a distributed denial-of-service (DDoS) attack against roughly 3 million internet-connected toothbrushes, causing damage to the tune of millions of euros.

What does a denial of service attack look like? ›

A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources. This is usually accomplished by flooding the targeted host or network with traffic until the target can't respond or crashes.

What's the difference between DoS and DDoS? ›

What Is the Difference Between DoS Attacks and DDoS Attacks? A denial-of-service (DoS) attack floods a server with traffic, making a website or resource unavailable. A distributed denial-of-service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource.

What industries are most targeted for DDoS attacks? ›

Attacks against the sector rose 154% year-over-year, driven largely by the rise of cyber hacktivist groups and increasingly powerful botnets. Financial services accounted for about 35% of all DDoS attacks, surpassing the gaming industry, which previously led all sectors.

Are DDoS attacks illegal in the United States? ›

DDoS attacks are illegal. According to the Federal Computer Fraud and Abuse Act, an unauthorized DDoS attack can lead to up to 10 years in prison and a $500,000 fine. Conspiring to do so can lead to 5 years and $250,000. However, these serious consequences are applicable to attacks launched without permission.

Who is typically targeted in DDoS attacks? ›

In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected. Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations.

What do hackers get out of DDoS? ›

Volume-based DDoS attacks

The goal of this type of attack is to overload the website's bandwidth or cause CPU or IOPS usage issues. The attacker employs a basic tactic – more resources wins this game. If they can overload your resources, the attack is successful. It is quite easy for attackers to achieve their goals.

Is the toothbrush DDoS hoax? ›

The three million toothbrush botnet story isn't true,” Kevin Beaumont, a reputable cybersecurity researcher wrote on Mastodon, later describing it as “total bollocks”.

Did a massive toothbrush DDoS just happen? ›

It didn't actually happen. The story is fiction. Three million smart toothbrushes didn't launch a DDoS attack against a Swiss company. If they really had launched the attack, Fortinet's PR team would surely have been pushing out the news left, right, and centre.

What is the world's most murderous malware? ›

Triton is malware first discovered at a Saudi Arabian petrochemical plant in 2017. It can disable safety instrumented systems, which can then contribute to a plant disaster. It has been called "the world's most murderous malware."

What is the cyber attack on toothbrushes? ›

As many as three million smart toothbrushes were reportedly converted into a massive botnet to carry out a distributed denial of service (DDoS) attack against a Swiss company. According to Aargauer Zeitung, the cyberattack took down the company's website for several hours.

What are two examples of a denial of service attack? ›

Some common examples of DDoS attacks are UDP flooding, SYN flooding and DNS amplification.

Could millions of hacked toothbrushes be used in a cyber attack? ›

KGTV) — A story you may have seen claims millions of hacked toothbrushes were used in a Swiss cyber attack. That's fiction. Last week, a Swiss-German news site published a story that three million smart toothbrushes had been hacked to conduct attacks against a company. But that wasn't the case.

What is the CIA triad denial of service attack? ›

CIA Triad and DDoS Attack

In cybersecurity, we think of the CIA triad in terms of types of attacks: Confidentiality: Is my information secret? Integrity: Is my information accurate and trustworthy? Availability: Can I get my information when and where I need it?

References

Top Articles
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 6214

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.