According to the Kaspersky Lab IoT report, in the first half of 2018, IoT devices were attacked with more than 120,000 modifications of malware. That’s more than triple the amount of IoT malware seen in the whole of 2017.

 

Kaspersky Lab warns that the snowballing growth of malware families for smart devices is a continuation of a dangerous trend: 2017 also saw the number of smart device malware modifications rise to 10 times the amount seen in 2016.

 

The market for IoT devices (also known as “smart” gadgets), and their role in everyday life, is growing exponentially. But cybercriminals are seeing the financial opportunities too, and are multiplying and differentiating their attacks as a result.

 

The danger for consumers who love their IoT gadgets, is that threats can strike unexpectedly, turning seemingly harmless devices into powerful machines for illegal activity. This can include malicious cryptocurrency mining, DDoS attacks, or the discreet inclusion of devices in botnet activities.

 

Aware of these dangers, Kaspersky Lab experts regularly review the data collected from various sources including our honeypots – decoy devices used to attract the attention of cybercriminals and analyze their activities.

 

The latest updates are striking: during the first half of 2018, the number of malware modifications aimed at IoT devices registered by researchers was more than three times higher than the number registered in the whole of 2017.

 


 

The statistics show that the most popular method of IoT malware propagation is still the brute forcing of passwords or repetitive attempts at various password combinations. Brute forcing was used in 93% of detected attacks. In most of the remaining cases, access to an IoT device was gained using well-known exploits.

 

The devices most often attacking Kaspersky Lab honeypots were routers (by a large margin). 60% of the registered attempts to attack our virtual devices were coming from them. The remaining share of compromised IoT gadgets included a variety of different technologies, such as DVR-devices and printers. The honeypots even registered an attack coming from 33 washing machines.

 

Different cybercriminals may have different reasons to exploit IoT, but the most popular goal is to facilitate DDoS-attacks by creating botnets. Some malware modifications are also tailored to turn off competing malware, fix its own vulnerabilities and shutdown vulnerable services on the device.

 

Compared to personal computers and smartphones, IoT devices might not seem powerful enough to attract cybercriminals and be used in their illegal activity. However, their lack of performance is more than outweighed by their number, and the fact that some smart gadget manufacturers are still not paying enough attention to the security of their products. Even if vendors begin to provide their devices with better security now, it will be a while before old vulnerable devices have been phased out of our homes. In addition, IoT malware families are customizing and developing very fast, and while previously exploited breaches have not been fixed, criminals are constantly discovering new ones. IoT products have therefore become an easy target for cybercriminals who can turn simple machines into a powerful device for illegal activity, such as spying, stealing and blackmailing,” says Mikhail Kuzin, Security Researcher at Kaspersky Lab.

 

To reduce the risk of infection, users are advised to:

  • Install updates for the firmware you use as soon as possible. Once a vulnerability is found, it can be fixed through patches within updates.
  • Always change preinstalled passwords. Use complicated passwords that include both capital and lower case letters, numbers and symbols.
  • Use Kaspersky Smart Home and IoT Scanner to check your IoT devices for vulnerabilities and infections.
  • Reboot a device as soon as you think it’s acting strangely. It might help get rid of existing malware, but this doesn’t reduce the risk of getting another infection.

 

Read the full version on Securelist.com.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Kaspersky Lab Unravels the Truth on Cyber Espionage at its 3rd APAC Cyber Security Conference
Techworld Date Posted: 17 October 2017 1:26 PM | 363 Views
Kaspersky Lab unriddled the mysterious threat of cyberespionage against countries, critical infrastructure, and companies in the region on its 3rd Asia Pacific (APAC) Cyber Security Weekend in Phuket, Thailand last week.. See More
 
Kaspersky Lab Unravels the Truth on Cyber Espionage at its 3rd APAC Cyber Security Conference
Techworld Date Posted: 1:26 PM | 363 Views
Kaspersky Lab unriddled the mysterious threat of cyberespionage against countries, critical infrastructure, and companies in the region on its 3rd Asia Pacific (APAC) Cyber Security Weekend in Phuket, Thailand last week.See More

 
Predictions: AI Fuzzing and Machine Learning Poisoning
Techworld Date Posted: 27 December 2018 4:39 PM | 168 Views
  For many criminal organizations, attack techniques are evaluated not only in terms of their effectiveness, but in the overhead required to develop, modify, and implement them. To maximize revenue, for example, they are.... See More
 
Predictions: AI Fuzzing and Machine Learning Poisoning
Techworld Date Posted: 4:39 PM | 168 Views
  For many criminal organizations, attack techniques are evaluated not only in terms of their effectiveness, but in the overhead required to develop, modify, and implement them. To maximize revenue, for example, they are...See More

 
The Nightmare Before Christmas: A Third of Shoppers’ Financial Credentials Compromised
Techworld Date Posted: 20 December 2018 4:32 PM | 118 Views
The time of unrestrained shopping has already begun, thanks to Black Friday in November. This is swiftly followed by Christmas and New Year gift-giving, and then the January sales.. See More
 
The Nightmare Before Christmas: A Third of Shoppers’ Financial Credentials Compromised
Techworld Date Posted: 4:32 PM | 118 Views
The time of unrestrained shopping has already begun, thanks to Black Friday in November. This is swiftly followed by Christmas and New Year gift-giving, and then the January sales.See More

 
Kaspersky Lab Moving Core Infrastructure from Russia to Switzerland; Opening First Transparency Center
Techworld Date Posted: 16 May 2018 3:56 PM | 646 Views
As part of its Global Transparency Initiative, Kaspersky Lab is adapting its infrastructure to move a number of core processes from Russia to Switzerland.. See More
 
Kaspersky Lab Moving Core Infrastructure from Russia to Switzerland; Opening First Transparency Center
Techworld Date Posted: 3:56 PM | 646 Views
As part of its Global Transparency Initiative, Kaspersky Lab is adapting its infrastructure to move a number of core processes from Russia to Switzerland.See More

 
PUBG Desert Map Gets a New Weapon, the R45 Revolver
Techworld Date Posted: 9 December 2017 9:36 AM | 2189 Views
NVIDIA premiered a new weapon for the upcoming desert zone in PLAYERUNKNOWN’S BATTLEGROUNDS (PUBG) today on GeForce.com. . See More
 
PUBG Desert Map Gets a New Weapon, the R45 Revolver
Techworld Date Posted: 9:36 AM | 2189 Views
NVIDIA premiered a new weapon for the upcoming desert zone in PLAYERUNKNOWN’S BATTLEGROUNDS (PUBG) today on GeForce.com. See More

 
ZOWIE eXTREMESLAND Qualifiers Is Now Open
Techworld Date Posted: 26 July 2018 1:41 PM | 539 Views
BenQ Philippines in Partnership with ArkAngel Internet Café and WASD Philippines is proud to bring the Extremesland Official Philippine Qualifiers.. See More
 
ZOWIE eXTREMESLAND Qualifiers Is Now Open
Techworld Date Posted: 1:41 PM | 539 Views
BenQ Philippines in Partnership with ArkAngel Internet Café and WASD Philippines is proud to bring the Extremesland Official Philippine Qualifiers.See More

 
Kaspersky Lab Reveals PH Threat Landscape, Advocates Public-Private Collaboration in its First CyberSecurity Summit with the DICT
Techworld Date Posted: 7 August 2017 11:27 AM | 358 Views
The Department of Information and Communications Technology (DICT) Secretary Rodolfo Salalima (second from left) shakes hand with Kaspersky Lab Asia Pacific Managing Director Stephan Neumeier (third from left) during the media briefing for their.... See More
 
Kaspersky Lab Reveals PH Threat Landscape, Advocates Public-Private Collaboration in its First CyberSecurity Summit with the DICT
Techworld Date Posted: 11:27 AM | 358 Views
The Department of Information and Communications Technology (DICT) Secretary Rodolfo Salalima (second from left) shakes hand with Kaspersky Lab Asia Pacific Managing Director Stephan Neumeier (third from left) during the media briefing for their...See More

 
NARUTO TO BORUTO: SHINOBI STRIKER UNVEILS ITS GAMEPLAY WITH MORE DETAILS ABOUT FIGHTERS AND BATTLE MODES
Techworld Date Posted: 23 August 2017 11:49 AM | 394 Views
BANDAI NAMCO Entertainment Asia is excited to reveal the amazing new content about the acrobatic ninja battle action game developed by Soleil Ltd. AVATAR SYSTEM For the first time in the Naruto series, the Avatar System.... See More
 
NARUTO TO BORUTO: SHINOBI STRIKER UNVEILS ITS GAMEPLAY WITH MORE DETAILS ABOUT FIGHTERS AND BATTLE MODES
Techworld Date Posted: 11:49 AM | 394 Views
BANDAI NAMCO Entertainment Asia is excited to reveal the amazing new content about the acrobatic ninja battle action game developed by Soleil Ltd. AVATAR SYSTEM For the first time in the Naruto series, the Avatar System...See More

 
F5 Delivers Application Services for a Multi-Cloud World
Techworld Date Posted: 12 July 2017 2:12 PM | 384 Views
MANILA, PHILIPPINES – F5 Networks (NASDAQ: FFIV) announces the availability of offerings designed to provide consistent application services in multi-cloud environments—giving companies greater deployment flexibility, more effective security, and faster time to market.. See More
 
F5 Delivers Application Services for a Multi-Cloud World
Techworld Date Posted: 2:12 PM | 384 Views
MANILA, PHILIPPINES – F5 Networks (NASDAQ: FFIV) announces the availability of offerings designed to provide consistent application services in multi-cloud environments—giving companies greater deployment flexibility, more effective security, and faster time to market.See More

 
Cyber Criminals Cash in on Millions with Formjacking, Pose Serious Threat to Businesses and Consumers
Techworld Date Posted: 14 March 2019 10:57 AM | 154 Views
Faced with diminishing returns from ransomware and cryptojacking, cyber criminals are doubling down on alternative methods such as formjacking to make money, according to Symantec’s (Nasdaq: SYMC) Internet Security Threat Report (ISTR) Volume 24.. See More
 
Cyber Criminals Cash in on Millions with Formjacking, Pose Serious Threat to Businesses and Consumers
Techworld Date Posted: 10:57 AM | 154 Views
Faced with diminishing returns from ransomware and cryptojacking, cyber criminals are doubling down on alternative methods such as formjacking to make money, according to Symantec’s (Nasdaq: SYMC) Internet Security Threat Report (ISTR) Volume 24.See More


Power by

Download Free AZ | Free Wordpress Themes