How IoT Botnets Are Used in Large-Scale Cyberattacks

IoT Botnets Serve to Carry Out Large-Scale Cyberattacks

Site: infolinkjdbiz

Kingston Blogger: Casey Gibson

Date: June 1, 2016

Introduction

Iot botnets! Ddos attacks!, network security?, botnet prevention?? Consumers are not entirely sure what that means nor do we care because this is tech jamestownation. Bottom line: The emergence of IoT (Internet of Things) devices in homes and businesses means that another threat has arrived on the scene. These devices are exploited by cybercriminals to form botnets and at scale attack infrastructures, effectively paralyzing businesses. So what is the working system of these cyber threats, and how (firewalls) businesses — business using or renting firewalls, servers etc– can protect them?

What is an IoT Botnet?

Do try to imagine it — thousands of devices all over the planet (from refrigerators and security cameras, smart ones) serving [sic] a cybercriminal. This is an IoT botnet.

Botnet

Remote controlled of multiple layers over many points.

IoT Devices

Any internet-connected gadget, from thermostats to massive industrial machines.

Botnets can redirect a huge number of traffic to one target, and hence doing DDoS attacks which could bring down the servers.

Why IoT?

Security is often an afterthought for IoT devices making them low hanging fruits as well. The undeniable point is — at least in the Western world — we have them literally everywhere. Their large and universal presence makes them ideal for a botnet.

What Makes IoT Devices Hijackable

Well then, you must be thinking how do these devices get hijacked in the first place?

  1. Default Passwords: There are the large amount of IoT devices with a default password which user never change it. This is how they are able to easily compromise your account as cybercriminals use common credential lists.
  2. Outdated Firmware — When software of the device is not up to date and can be easily hacked by known exploits.
  3. Open Networks – Why Devices on open networks are hanging fruits for the attackers.
  4. Poor encryption — Data flowing between IoT devices can be unencrypted making it possible for hackers to intercept and tamper with.

How Do They Do It?

  • Scanning: Cybercriminals constantly scan the internet for open devices.
  • Implementation: First, they will look for an open MongoDB server; then exploit any known vulnerability or brute force.

Infection: Once the breach occurs, then malware gets downloaded and the device becomes part of a botnet.

IoT Botnet Attack Case Studies

The Mirai Botnet

  • Year: 2016
  • Impact: Brought down the likes of Twitter, Netflix and PayPal
  • How: Thousands of different IoT devices, over 100k in total, took part to a DDoS attack.
  • Cyberseguridad: atacó contraseñas bajas y sin cambio en dispositivos.

The Satori Botnet

  • Year: 2018
  • Target: Mining-devices and routers.
  • Method: Used 0-day vulnerabilities to take over devices
  • Outcome: Targeted networks threw huge spikes of traffic into Chaos.

The Moobot

  • Year: 2019
  • Reach: Mostly influenced the Asian market.
  • Tactics: Implemented via vulnerabilities in smart cameras
  • Impact: Large data breach and network outage.

What We Learn

Such attacks underscore a massive weakness in consumer attitudes towards IoT security. Both ends of the spectrum can bring about extensive cyber consequences due to ignorance and neglect.

Saving IoT Devices from Becoming Happy Qbot Botnets

How do we avoid making another botnet army out of our IoT devices?

  • Typing the Default Credentials: Change it to a Password:
  • Real-time password changes after setup.
  • Strong, unique passwords for each device.

Regular Firmware Updates

  • Program updates from OEMs on time
  • Look for automatic updates in devices.

Improved Network Security

  • IoT devices should be on a separate, secured network.
  • Strong encryption protocols (WPA3).

Implement Firewalls

  • Rented advanced firewalls with the IoT protection (available from some security vendors for separate IoT).
  • Change the configuration to allow essential traffic only.

Monitor Network Traffic

  • Look out for abnormal peaks or patterns regularly
  • Implement software with live alerts.

Educate Users

  • Organize IoT security workshops.
  • Background — Promote proactive security measures for employees and customers.

Business Note

If you are primarily a renter of firewalls, servers and routers as part of your service offering, this is something that deserves emphasis. Provide complete safety options designed to related all issues of protection located with capability botnet functions.

IoT botnets, DDoS attacks, network security, botnet prevention and hijacked devices: All in all IoT Botnets, DDoS Attacks, Network Security, Live Devices under Risk are the main subjects of recent Cyber World Story. It is imperative to take proactive steps and remain constantly vigilant to safeguard our networks and devices. If you can advance these, cybercriminals are less likely to be able to make any headway in disrupting the normal operation of your business.

How IoT Botnets Are Used in Large-Scale Cyberattacks

Leave a Reply

Your email address will not be published. Required fields are marked *