IoT Risks

IoT Risks

The U.S. Federal Bureau of Investigation (FBI) has released an article outlining what it has identified as the risks associated with internet-connected devices, commonly referred to as the Internet of Things (IoT). In the article, the FBI warns that cyber threat actors can use unsecured IoT devices as proxies to anonymously pursue malicious cyber activities. The key element is that IoT devices need to be evaluated for risk that they will act as a vector for attack into a network.

The FB lists as examples of targeted IoT devices: routers, wireless radios links, time clocks, audio/video streaming devices, Raspberry Pis, IP cameras, DVRs, satellite antenna equipment, smart garage door openers, and network attached storage devices.

IoT proxy servers, the article states, are attractive to malicious cyber actors because they provide a layer of anonymity by transmitting all Internet requests through the victim device’s IP address. Devices in developed nations are particularly attractive targets because they allow access to many business websites that block traffic from suspicious or foreign IP addresses. Cyber actors use the compromised device’s IP address to engage in intrusion activities, making it difficult to filter regular traffic from malicious traffic.

The FBI says that these bad actors, or cyber actors, are using compromised IoT devices as proxies to:

  • Send spam e-mails
  • Obfuscate network traffic
  • Mask Internet browsing
  • Generate click-fraud activities
  • Buy, sell, and trade illegal images and goods
  • Sell or lease IoT botnets to other cyber actors for financial gain

Cyber actors typically compromise devices with weak authentication, unpatched firmware or other software vulnerabilities, or employ brute force attacks on devices with default usernames and passwords.

Some of the key indicators that an IoT network or device has been compromised include:

  • A major spike in monthly Internet usage
  • A larger than usual Internet bill
  • Devices become slow or inoperable
  • Unusual outgoing Domain Name Service queries and outgoing traffic
  • Home or business Internet connections running slow

For details go to here.

要查看或添加评论,请登录

Serge Burlyga的更多文章

  • Time When Giants Are Failing

    Time When Giants Are Failing

    For Oracle, despite more than $35bn of acquisitions over seven years and shiny new cloud products, its revenues have…

  • 10 Jenkins Interview Questions

    10 Jenkins Interview Questions

    1. What are the software prerequisites that must be met before Jenkins is installed? Since version 2.

  • Apple App Store Review Process

    Apple App Store Review Process

    If you’ve ever submitted an iOS app and been rejected, it’s not as rare as you may think. According to an Apple lawyer,…

  • Who Will Drive Your Car?

    Who Will Drive Your Car?

    Cars have been pretty stupid in the past, even with all of the computerization and automation that has come in recent…

  • Back To School

    Back To School

    Summer vacation is over and it’s time for your kids to go back to school. The technology that awaits them when the bell…

  • Intel's Paranoia

    Intel's Paranoia

    For all its power, success, profits and influence, life at Intel is a permanent struggle. Chide if you will Andy…

  • Carbon Capture By Norway

    Carbon Capture By Norway

    The Norwegian Ministry of Petroleum and Energy has announced that it will be moving forward with an undersea project…

  • I can’t quit you, baby

    I can’t quit you, baby

    If any company had a reason to dump Oracle, it’s Amazon. And yet, 14 years after Amazon lamented its “straining…

  • Sharks

    Sharks

    When scientists want to study birds, they have an enormous crowdsourced data set that they can use. When they want to…

  • Desktop As A Service

    Desktop As A Service

    Does it make sense to move this to the cloud, consuming the desktop as a service (DaaS) along with everything else?…

社区洞察

其他会员也浏览了