Xiongmai denies in a statement made to the BBC that its devices represented the majority of those used in the attack, and indeed it appears likely that IoT hardware from a large number of different manufacturers were involved. Still, Xiongmai has instituted a recall for all webcams that use its circuit board and other components, which represents a sizeable number of devices because of how many companies Xiongmai supplies.
The attack on Dyn DNS was powered in part by a botnet of hacked DVRs and webcams known as Mirai. The source code for the malware that controls this botnet was put on Github earlier this month. And Flashpoint also notes that the hacker who released Mirai is known to frequent a hacking forum called hackforums[.]net.
So far, only one vendor has responded to the October 21st attacks. After it was identified by security researchers as having made devices used in Friday's takedowns, Chinese firm Hangzhou Xiongmai Technology was compelled to recall some of its surveillance webcams sold in the US.
aa06259810