Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky detects more than 100M attacks on smart devices in H1 2019

Capitalizing on weak security of Internet of Things (IoT) products, cybercriminals are intensifying their attempts to create and monetize IoT botnets. This and other findings are a part of the ‘IoT: a malware story’ report on honeypot activity in the first half of 2019 (H1 2019).

Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. This figure is around nine times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses.

Capitalizing on weak security of Internet of Things (IoT) products, cybercriminals are intensifying their attempts to create and monetize IoT botnets. This and other findings are a part of the ‘IoT: a malware story’ report on honeypot activity in the first half of 2019 (H1 2019).

Cyberattacks on IoT devices are booming, as even though more and more people and organizations are purchasing ‘smart’ (network-connected and interactive) devices, such as routers or DVR security cameras, not everybody considers them worth protecting.

Cybercriminals, however, are seeing more and more financial opportunities in exploiting such gadgets. They use networks of infected smart devices to conduct DDoS attacks or as a proxy for other types of malicious actions. To learn more about how such attacks work and how to prevent them, Kaspersky experts set up honeypots – decoy devices used to attract the attention of cybercriminals and analyze their activities.

Based on data analysis collected from honeypots, attacks on IoT devices are usually not sophisticated, but stealth-like, as users might not even notice their devices are being exploited. The malware family behind 39% of attacks – Mirai – is capable of using exploits, meaning that these botnets can slip through old, unpatched vulnerabilities to the device and control it. 

Advertisement. Scroll to continue reading.

Another technique is password brute-forcing, which is the chosen method of the second most widespread malware family in the list – Nyadrop. 

Nyadrop was seen in 38.57% of attacks and often serves as a Mirai downloader. This family has been trending as one of the most active threats for a couple of years now. The third most common botnet threatening smart devices – Gafgyt with 2.12% – also uses brute-forcing.

The researchers were also able to identify the locations where most infections were discovered to have originated during the first six months of 2019. Topping the list of sources of infections is China, with 30% of all attacks taking place from this country, second is Brazil with 19%, followed by Egypt with 12%. In the same period last year, the situation was different with 28% detected from Brazil, 14% from China and 11% from Japan.

“As people become more and more surrounded by smart devices, we are witnessing how IoT attacks are intensifying. Judging by the increased number of attacks and criminals’ persistence, we can say that IoT is a fruitful area for attackers that use even the most primitive methods, like guessing passwords and login combinations. This is much easier than most people think: the most common combinations by far are usually “support/support”, followed by “admin/admin”, “default/default”. It’s quite easy to change the default password, so we urge everyone to take this simple step towards securing your smart devices,” said Dan Demeter, security researcher at Kaspersky.

To keep devices safe, Kaspersky recommends users to:

Advertisement. Scroll to continue reading.
  • Install updates for the firmware you use as soon as possible. Once a vulnerability is found, it can be fixed through patches within updates.
  • Always change preinstalled passwords. Use complicated passwords that include both capital and lowercase letters, numbers and symbols if it’s possible.
  • Reboot a device as soon as you think it’s acting strangely. It might help get rid of existing malware, but this doesn’t reduce the risk of getting another infection.
  • Keep access to IoT devices restricted by a local VPN, allowing you to access them from your “home” network, instead of publicly exposing them on the internet.

Kaspersky recommends companies to take the following measures:

  •  Use threat data feeds to block network connections originating from malicious network addresses detected by security researchers.
  •  Make sure all devices software is up to date. Unpatched devices should be kept in a separate network inaccessible by unauthorized users.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

As part of Alibaba’s video generation large model – the Wan2.1 series – VACE is the first open-source model in the industry to provide...

HEADLINES

From January to December 2024, Kaspersky solutions used by businesses here detected and blocked more than 53 million bruteforce attacks. 

HEADLINES

According to Kaspersky experts, 2024 saw over 3 billion malware attacks globally, with a daily average of 467,000 malicious files detected. Windows systems were...

HEADLINES

The unveiling of the new advanced laser eye procedure serves as a significant milestone for FUMC as it brings together their medical expertise and...

HEADLINES

Alipay+ GenAI Cockpit is a platform to help entrepreneurs architect an agentic and ultimately AI-native financial services, combining automated workflows and task orchestration with...

HEADLINES

For the 10th year in a row, Oracle was recognized based on its Ability to Execute and Completeness of Vision for Oracle Fusion Cloud Warehouse...

HEADLINES

For generations, many moms have leaned on the wisdom and guidance passed down from their mothers and grandmothers. But in today's geographically dispersed, tech-forward...

HEADLINES

GlobalData, a research and analysis firm, released its 2025 Competitive Landscape Assessment report on Managed Infrastructure Services for Telcos. The report named Huawei as...

Advertisement