Cyber crime has moved closer to home than ever. The cyber attack that slowed many popular websites to a crawl last week is attracting new scrutiny to the security of the so-called "Internet of Things."
The attack last week used a new type of malware that takes control of tens of millions of personal devices connected to the internet — including home routers, baby monitors and cameras — without their owners' knowledge.
It was aimed squarely at Dyn, a New Hampshire tech company that monitors and routes traffic for major internet companies, including Airbnb, Etsy, Spotify and Twitter and popular news sites like The New York Times, The Financial Times and CNBC.com.
The co-opted smart devices then worked in concert to overwhelm Dyn's systems with junk traffic, crippling access to their clients' sites for several hours.
The FBI and the Department of Homeland Security are investigating the attack.
In a interview Sunday at Dyn headquarters, Chief Strategy Officer Kyle York called the attack "absolutely unprecedented."
"What we discovered [was that] it was a part of an botnet attack called the Mirai botnet, which basically goes into folks' homes and takes over Internet of Things devices and literally turns them into attack vectors," York said.
A senior U.S. intelligence official and other cyber experts told NBC News that the attack was likely not to have been state-sponsored.