MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

MERIT Solutions can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at (757) 420-5150 to get started. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Software Network Security Hosted Solutions Backup google Internet Computer Disaster Recovery Productivity Microsoft Business Managed IT Services Windows 10 Business Continuity IT Support IT Services VoIP Innovation User Tips Hardware Mobile Devices Outsourced IT communications Business Management Efficiency Windows Email Mobility Productivity Ransomware Mobile Device Management Managed IT Smartphone Server Cybercrime Saving Money Save Money Telephone Systems Cybersecurity Apps Hosted Solution Quick Tips Android Virtualization Operating System Law Enforcement Recovery Small Business Microsoft Office Chrome BYOD Data BDR Money VPN Passwords Information Technology browser Password Data Management Social upgrade Office 365 Hacking Avoiding Downtime Communication Health Miscellaneous Managed Service Provider Wireless Computers Facebook Data Backup Unsupported Software Budget Smartphones Shortcut Work/Life Balance Wi-Fi Firewall Application Data Recovery Current Events Audit search Google Drive App Automation Telephony Alert USB Applications Save Time Private Cloud Office tips Government Risk Management Data Security Proactive IT Social Media Cloud Computing Gadgets Workplace Tips DDoS IT Support Employer-Employee Relationship Holiday Cost Management Network Television Social Engineering Apple Samsung Antivirus Streaming Media Hacker Windows 10 Battery Internet Exlporer Solid State Drive WiFi Wireless Technology HaaS Compliance Spam Going Green Bandwidth Phishing Personal Information iPhone Automobile Data Storage Politics Managed IT Services Mobile Computing Transportation Saving Time User Error Cleaning Robot Office Computer Care History Phone System End of Support Remote Computing Gmail Encryption Best Practice Users Identity Theft Internet of Things Update The Internet of Things Humor Disaster IT solutions Flexibility Collaboration Data storage Managing Stress Professional Services WSJ IT Management Administration Exchange Books Windows 10s Chromecast Scalability Nanotechnology Education Distributed Denial of Service Travel altivista Hiring/Firing Vendor Management Commerce Sports Router SaaS WIndows Server 2008 Colocation SBS Hard Disk Drive How To Benefits Root Cause Analysis Tech Support Tablets Hard Drives compaq Files Lithium-ion battery Wearable Technology Unified Threat Management Patch Management Content Filtering Administrator Augmented Reality NFL hp Training Business Intelligence Entertainment Touchscreen Upgrades Outlook Relocation domain Electronic Medical Records Vulnerability Access Point of Sale Word Company Culture Managed IT Service HIPAA Black Market Consultant Excel remote iOS Yahoo Smart Technology eWaste Windows Ink PDF Value Avoid Downtime Shadow IT Running Cable Two-factor Authentication Regulation Server 2008 Computer Fan Ali Rowghani OneNote Document Management Google Maps Text Messaging Trending Screen Mirroring Experience Data Breach Sync Dark Web Meetings Cast Emails Video Games Virtual Reality Adobe server installation dvd "cannot install required files" stock Scam Settings Laptop Uninterrupted Power Supply Data Loss Music Marketing Legal Licensing tweet Employer Employee Relationship Touchpad Google Docs HBO Reputation Analytics Webinar Instant Messaging Mobile Advertising calculator Keyboard Twitter Computer Accessories Worker Commute Artificial Intelligence Mobile Device Data Protection control Big Data IT solutions File Sharing Storage Safety CrashOverride Emergency Software as a Service Worker Thank You WannaCry Cache Congratulations Monitors Microsoft Excel Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...