Attacks on IoT devices tripled

in #iot6 years ago

5ba207300f25431840b27558.jpeg

The IoT (Internet of Things) devices market, also known as smart devices, and the location of these devices in our daily lives are growing rapidly. Cybercriminals see the financial opportunities in this area and increase and differentiate their attacks. The main danger for consumers who love IoT devices is that the threats that come out in unexpected moments can turn these devices, which seem harmless, into powerful machines for illegal activities. Examples of this are harmful crypto-money mining, DDoS attacks or secretly participating in botnet activities. According to the #Kaspersky Lab #IoT report, in the first half of 2018, IoT devices were attacked with over 120,000 malware versions. This number is more than three times the number of IoT #malware seen throughout 2017. Kaspersky Lab warns that this large increase in malware families targeting smart devices is a continuation of a dangerous trend. In 2017, the number of malware versions targeting smart devices increased by 10 times compared to 2016.

Being aware of these dangers, Kaspersky Lab experts regularly review data collected from different sources. These sources include information gathering devices used to capture the attention of cyber criminals and analyze their activities. The most recent data from these sources is shocking. In the first half of 2018, the number of malware versions targeted by IoT devices and detected by researchers was three times higher than that seen in the whole of 2017.

Statistics show that the most commonly used method for spreading IoT malware is still applying brute force to the passwords, ie, trying several consecutive password combinations. This method was used in 93% of the detected attacks. In most of the remaining cases, access to IoT devices was obtained using known deficits.

Kaspersky Lab's devices were the most frequently attacked devices. 60% of the attack attempts for our virtual devices came through routers. Among the remaining seized IoT devices, there are many different technologies, from DVR devices to printers. The data collection devices found that 33 attacks came from washing machines.

The most popular purpose is to organize DDoS attacks by creating botnet, although there are different reasons to take advantage of IoT vulnerabilities in different cyber criminals. Some malware versions are designed to disable competitor malware, correct their vulnerabilities, and shut down services that are vulnerable to attack on the device.

Kaspersky Lab SecurityDikkat Compared to personal computers and smartphones, IoT devices may not seem strong enough to attract the attention of cyber-criminals and use it in their illegal activities, eye says Mikhail Kuzin, researcher. However, the number of these devices prevents performance shortcomings. The fact that some smart device manufacturers still do not pay enough attention to the safety of their products is also attracting the attention of cyber criminals. In addition, IoT malware families are rapidly evolving and evolving. As the previously exploited deficits are not closed, criminals continue to find new deficits. Therefore, IoT products have become easy targets for cyber criminals. These simple machines, spying,

To reduce the risk of malware infection, users are recommended:
Install the firmware updates that you are using at the earliest opportunity. When an open is found, patches can be repaired by updates.

Always change the pre-installed passwords. Use complex passwords that contain uppercase and lowercase letters, numbers, and symbols.

Use Kaspersky Smart Home and IoT Scanner solutions to check your IoT devices for vulnerabilities and infections.

Restart the devices that you think are behaving differently. This may help you to avoid existing malware, but not the risk of re-infection.

Sort:  

Upvoted.

DISCLAIMER: Your post is upvoted based on curation algorithm configured to find good articles e.g. stories, arts, photography, health, etc. This is to reward you (authors) for sharing good content using the Steem platform especially newbies.
If you're a dolphin or whales, and wish not to be included in future selection, please let me know so I can exclude your account. And if you find the upvoted post is inappropriate, FLAG if you must. This will help a better selection of post.

Keep steeming good content.
@Yehey

Posted using https://Steeming.com condenser site.