According to the Kaspersky Lab IoT report, in the first half of 2018, IoT devices were attacked with more than 120,000 modifications of malware. That’s more than triple the amount of IoT malware seen in the whole of 2017.

 

Kaspersky Lab warns that the snowballing growth of malware families for smart devices is a continuation of a dangerous trend: 2017 also saw the number of smart device malware modifications rise to 10 times the amount seen in 2016.

 

The market for IoT devices (also known as “smart” gadgets), and their role in everyday life, is growing exponentially. But cybercriminals are seeing the financial opportunities too, and are multiplying and differentiating their attacks as a result.

 

The danger for consumers who love their IoT gadgets, is that threats can strike unexpectedly, turning seemingly harmless devices into powerful machines for illegal activity. This can include malicious cryptocurrency mining, DDoS attacks, or the discreet inclusion of devices in botnet activities.

 

Aware of these dangers, Kaspersky Lab experts regularly review the data collected from various sources including our honeypots – decoy devices used to attract the attention of cybercriminals and analyze their activities.

 

The latest updates are striking: during the first half of 2018, the number of malware modifications aimed at IoT devices registered by researchers was more than three times higher than the number registered in the whole of 2017.

 


 

The statistics show that the most popular method of IoT malware propagation is still the brute forcing of passwords or repetitive attempts at various password combinations. Brute forcing was used in 93% of detected attacks. In most of the remaining cases, access to an IoT device was gained using well-known exploits.

 

The devices most often attacking Kaspersky Lab honeypots were routers (by a large margin). 60% of the registered attempts to attack our virtual devices were coming from them. The remaining share of compromised IoT gadgets included a variety of different technologies, such as DVR-devices and printers. The honeypots even registered an attack coming from 33 washing machines.

 

Different cybercriminals may have different reasons to exploit IoT, but the most popular goal is to facilitate DDoS-attacks by creating botnets. Some malware modifications are also tailored to turn off competing malware, fix its own vulnerabilities and shutdown vulnerable services on the device.

 

Compared to personal computers and smartphones, IoT devices might not seem powerful enough to attract cybercriminals and be used in their illegal activity. However, their lack of performance is more than outweighed by their number, and the fact that some smart gadget manufacturers are still not paying enough attention to the security of their products. Even if vendors begin to provide their devices with better security now, it will be a while before old vulnerable devices have been phased out of our homes. In addition, IoT malware families are customizing and developing very fast, and while previously exploited breaches have not been fixed, criminals are constantly discovering new ones. IoT products have therefore become an easy target for cybercriminals who can turn simple machines into a powerful device for illegal activity, such as spying, stealing and blackmailing,” says Mikhail Kuzin, Security Researcher at Kaspersky Lab.

 

To reduce the risk of infection, users are advised to:

  • Install updates for the firmware you use as soon as possible. Once a vulnerability is found, it can be fixed through patches within updates.
  • Always change preinstalled passwords. Use complicated passwords that include both capital and lower case letters, numbers and symbols.
  • Use Kaspersky Smart Home and IoT Scanner to check your IoT devices for vulnerabilities and infections.
  • Reboot a device as soon as you think it’s acting strangely. It might help get rid of existing malware, but this doesn’t reduce the risk of getting another infection.

 

Read the full version on Securelist.com.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Tech4ED Named as Finalist in IDC Smart City Asia Pacific Awards (SCAPA) 2017
Techworld Date Posted: 20 June 2017 2:32 PM | 299 Views
MANILA – IDC Government Insights Asia Pacific announced today that Tech4ED has been chosen as one of the finalists in the annual IDC Smart City Asia Pacific Awards (SCAPA) 2017 under the category of.... See More
 
Tech4ED Named as Finalist in IDC Smart City Asia Pacific Awards (SCAPA) 2017
Techworld Date Posted: 2:32 PM | 299 Views
MANILA – IDC Government Insights Asia Pacific announced today that Tech4ED has been chosen as one of the finalists in the annual IDC Smart City Asia Pacific Awards (SCAPA) 2017 under the category of...See More

 
Lenovo Opens Concept Store in Tacloban
Techworld Date Posted: 25 October 2018 2:01 PM | 83 Views
Technology leader, Lenovo, has recently opened its newest concept store in Tacloban City, Leyte, as part of its efforts to bring its services closer to customers in the region and bolster its presence in.... See More
 
Lenovo Opens Concept Store in Tacloban
Techworld Date Posted: 2:01 PM | 83 Views
Technology leader, Lenovo, has recently opened its newest concept store in Tacloban City, Leyte, as part of its efforts to bring its services closer to customers in the region and bolster its presence in...See More

 
Lian Li Announces Thanksgiving Build Contest in Partnership with Der8auer, ASUS and ADATA
Techworld Date Posted: 12 November 2018 4:54 PM | 173 Views
Lian Li Industrial Co. Ltd., the world’s leading manufacturer of aluminum chassis for enthusiasts, custom OEM/ODM case solutions, and case accessories is thrilled to invite all owners of Lian Li O11 Dynamic and O11.... See More
 
Lian Li Announces Thanksgiving Build Contest in Partnership with Der8auer, ASUS and ADATA
Techworld Date Posted: 4:54 PM | 173 Views
Lian Li Industrial Co. Ltd., the world’s leading manufacturer of aluminum chassis for enthusiasts, custom OEM/ODM case solutions, and case accessories is thrilled to invite all owners of Lian Li O11 Dynamic and O11...See More

 
HyperX Now the Official Gaming Headset Partner of the Dallas Mavericks and the Future Dallas NBA 2K League Team
Techworld Date Posted: 7 December 2017 3:19 PM | 266 Views
HyperX®, the gaming division of Kingston Technology, announced the official gaming headset sponsorship of the Dallas Mavericks and the future Dallas NBA 2K League team. . See More
 
HyperX Now the Official Gaming Headset Partner of the Dallas Mavericks and the Future Dallas NBA 2K League Team
Techworld Date Posted: 3:19 PM | 266 Views
HyperX®, the gaming division of Kingston Technology, announced the official gaming headset sponsorship of the Dallas Mavericks and the future Dallas NBA 2K League team. See More

 
SAP Calls for Public and Private Sector Organisations in the Philippines to Harness the Power of Data
Techworld Date Posted: 23 August 2017 1:34 PM | 259 Views
On photo: Ryan Poggi, Managing Director, SAP Philippines and Kathleen Muller, Head of Analytics and Insight, SAP Southeast Asia SAP SE (NYSE: SAP) said today it has harnessed its digital core, bold technologies of the.... See More
 
SAP Calls for Public and Private Sector Organisations in the Philippines to Harness the Power of Data
Techworld Date Posted: 1:34 PM | 259 Views
On photo: Ryan Poggi, Managing Director, SAP Philippines and Kathleen Muller, Head of Analytics and Insight, SAP Southeast Asia SAP SE (NYSE: SAP) said today it has harnessed its digital core, bold technologies of the...See More

 
Q2 2017 Akamai state of the Internet Security Report Analyzes Re-emergence of PBOT Malware Domain Generation Algorithms Relationship Between Mirai Command and Control and Attack Targets
Techworld Date Posted: 29 August 2017 3:41 PM | 308 Views
Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released.... See More
 
Q2 2017 Akamai state of the Internet Security Report Analyzes Re-emergence of PBOT Malware Domain Generation Algorithms Relationship Between Mirai Command and Control and Attack Targets
Techworld Date Posted: 3:41 PM | 308 Views
Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released...See More

 
Be Original, Buy Original
Techworld Date Posted: 12 July 2018 2:04 PM | 172 Views
In line with efforts to bring Nokia fans only the best mobile experience, HMD Global, the home of Nokia phones, warns consumers about counterfeit Nokia phones being sold in physical stores and online shops.. See More
 
Be Original, Buy Original
Techworld Date Posted: 2:04 PM | 172 Views
In line with efforts to bring Nokia fans only the best mobile experience, HMD Global, the home of Nokia phones, warns consumers about counterfeit Nokia phones being sold in physical stores and online shops.See More

 
WATCH: A 19-year Old Student Builds a Power Bank That Can Power Appliances On-the-Go
Techworld Date Posted: 27 March 2018 2:38 PM | 439 Views
We rely heavily on our gadgets these days. Almost everyone has a power bank for those times when you don’t have access to a power source to charge your phone. . See More
 
WATCH: A 19-year Old Student Builds a Power Bank That Can Power Appliances On-the-Go
Techworld Date Posted: 2:38 PM | 439 Views
We rely heavily on our gadgets these days. Almost everyone has a power bank for those times when you don’t have access to a power source to charge your phone. See More

 
Kaspersky Lab Warns of Dangers of ‘Balkanisation’ at Its 4th APAC Cyber Security Summit
Techworld Date Posted: 26 September 2018 4:00 PM | 151 Views
Kaspersky Lab presented the cybersecurity risks that can result from Balkanisation in cyberspace — the fragmentation of the world wide web, during its 4th Asia Pacific (APAC) Cyber Security Weekend in Siem Reap, Cambodia.. See More
 
Kaspersky Lab Warns of Dangers of ‘Balkanisation’ at Its 4th APAC Cyber Security Summit
Techworld Date Posted: 4:00 PM | 151 Views
Kaspersky Lab presented the cybersecurity risks that can result from Balkanisation in cyberspace — the fragmentation of the world wide web, during its 4th Asia Pacific (APAC) Cyber Security Weekend in Siem Reap, Cambodia.See More

Metamudkip
The Sudden Rise of the Shadow Brokers
Techworld • By: Metamudkip | Date Posted: 25 January 2018 4:26 PM | 260 Views
Governments have long been known to seek more information about their populace. In the United States, for example. See More
Metamudkip
The Sudden Rise of the Shadow Brokers
Techworld • By: Metamudkip | Date Posted: 4:26 PM | 260 Views
Governments have long been known to seek more information about their populace. In the United States, for exampleSee More


Power by

Download Free AZ | Free Wordpress Themes