1 min read

Weaponization of IoT Devices Increased in 2019, NTT Report Shows

Silviu STAHIE

May 22, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Weaponization of IoT Devices Increased in 2019, NTT Report Shows

Internet of Things (IoT) devices are gaining a more prominent role in cyberattack, becoming a force to be reckoned with, no matter the affected industry, according to NTT’s 2020 Global Threat Intelligence Report.

IoT devices are present at home, in companies, in cars, industrial settings, and anywhere else in between. While they play an invaluable role in our society, they can also be used in cyberattacks after bad actors gain control.

One reason IoT devices are insecure is that companies don’t provide proper support during their lifetimes. Improper default configurations are another reason these devices fall prey to attackers.

“Botnets such as Mirai and Echobot have advanced in automation, improving their propagation capabilities,” states the report. “Primarily aided by attacks leveraging default or hardcoded credentials, Mirai and variants targeted network backbone devices from several different vendors. Mirai and IoTroop are known for spreading through Internet of Things (IoT) attacks, then propagating through scanning and subsequent infection from identified hosts.”

No industry is safe from attacks that harness the power of IoT ecosystems. For example, Technology accounted for 25% of all attacks in 2019, and weaponization of IoT devices is the main reason.

Compromise, propagation, and botnet activity related to IoT devices are also expected to increase with the deployment of 5G networks. In this scenario, the IoT will be the source of attacks and a target at the same time.

As it stands, Bitdefender’s telemetry data shows that an average of two devices in each home are vulnerable to attacks. As such devices become more widely used, that number is sure to increase. Compromised devices become part of botnets, which in turn feed a dangerous and ever-growing vicious circle.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chinese criminals scam kids desperate to play games for more than three hours a week Chinese criminals scam kids desperate to play games for more than three hours a week
Graham CLULEY

August 12, 2022

2 min read
Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read