The nightmare comes true, dozens of Zombies are already in our house! In the past weeks I wrote about a Linux worm specifically designed to hit the Internet of Things, unfortunately this is just the beginning because according the forecasts the attacks will increase in the next months.
These networks of devices are privileged targets for cyber criminals that abusing their capabilities could launch cyber attacks in a large-scale.
“The attack that Proofpoint observed and profiled occurred between December 23, 2013 and January 6, 2014, and featured waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting Enterprises and individuals worldwide. More than 25 percent of the volume was sent by things that were not conventional laptops, desktop computers or mobile devices; instead, the emails were sent by everyday consumer gadgets such as compromised home-networking routers, connected multi-media centers, televisions and at least one refrigerator.”
As explained by the experts at Proofpoint, cyber attacks based in the IoT are very difficult to mitigate, consider that IoT networks are composed of hundreds of thousands of devices, to each node is possible to assign a small task to do, like to send few dozens of requests to a target in a DDoS attack, or send-out a few spam emails. In this way their action will go unnoticed by overall effect could be dramatic as explained in the post.
“No more than 10 emails were initiated from any single IP address, making the attack difficult to block based on location — and in many cases, the devices had not been subject to a sophisticated compromise; instead, misconfiguration and the use of default passwords left the devices completely exposed on public networks, available for takeover and use.”
Internet of things devices are always online, still poorly protected and, often, misconfigured.
“Bot-nets are already a major security concern and the emergence of thingbots may make the situation much worse,” “Many of these devices are poorly protected at best and consumers have virtually no way to detect or fix infections when they do occur. Enterprises may find distributed attacks increasing as more and more of these devices come on-line and attackers find additional ways to exploit them.” said David Knight, General Manager of Proofpoint’s Information Security division.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.