MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

MERIT Solutions can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at (757) 420-5150 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Productivity Business Management Backup google Managed IT Services Mobile Devices Computer Microsoft Disaster Recovery VoIP Business Continuity Business IT Support communications Outsourced IT Cybersecurity Email User Tips Windows 10 IT Services Productivity Hardware Innovation Efficiency Cybercrime Data Backup Apps Mobility Windows Saving Money Mobile Device Management Managed IT Server Small Business Ransomware Law Enforcement Internet of Things Smartphone Data Recovery Operating System browser Data Save Money Tech Term Android Virtualization Telephone Systems Money Smartphones Hosted Solution Quick Tips Phishing Passwords Cloud Computing BDR Data Security Information Technology Chrome Office 365 Recovery Communication VPN Microsoft Office BYOD Automation Password Holiday Computers Work/Life Balance Cost Management Wi-Fi upgrade Collaboration Social Media Social Best Practice IT Support Budget App Data Management Network Vulnerability Two-factor Authentication Facebook Wireless Government Risk Management Google Drive Hacking Unsupported Software Data Breach Avoiding Downtime Update Gadgets Alert Health Miscellaneous Managed Service Provider Shortcut Office tips Applications Private Cloud History Social Engineering Proactive IT Streaming Media Data Protection Firewall Application Antivirus Current Events Audit The Internet of Things search Personal Information Employer-Employee Relationship Windows 10 Politics Spam User Error USB Cleaning Save Time Wireless Technology Managed IT Services Identity Theft Telephony Workplace Tips Flexibility Robot Google Docs Television End of Support Remote Computing SaaS Apple Samsung Redundancy WiFi Content Filtering Battery Disaster Going Green Commerce HaaS Humor Blockchain Bandwidth Compliance eWaste Cortana Patch Management Automobile Mobile Security Devices Sports Value Tech Support Saving Time Hacker Wireless Charging Excel Office Solid State Drive Internet Exlporer Fraud Computer Care Data Storage Phone System Gmail OneNote Legal Encryption iPhone Users Mobile Computing IT solutions Transportation DDoS Data Loss Artificial Intelligence Project Management Big Data Marketing Exchange WannaCry Managing Stress Websites Updates Licensing Distributed Denial of Service altivista Connectivity MSP Conferencing HBO Books Webinar Scalability SBS Education Data Theft Microsoft Word Mobile Hiring/Firing Uninterrupted Power Supply Microsoft Excel Vendor Management compaq Content Filter Router Laptop intranet Gifts IT solutions How To Benefits Computing Wearable Technology Professional Services File Sharing hp Monitoring Touchpad Reputation IT budget Unified Threat Management IT Management Windows 10s domain Nanotechnology Advertising Analysis Travel Storage Training Entertainment Management Maintenance Credit Cards Upgrades WIndows Server 2008 Electronic Medical Records Hard Disk Drive Tablets remote Root Cause Analysis Point of Sale App store Data storage Company Culture Yahoo HIPAA Financial Technology Device Security Black Market Administration Identities Chromecast FAQ Consultant Safety NFL Smart Technology Server 2008 Augmented Reality Running Cable Lifestyle Ali Rowghani Business Intelligence Printing Touchscreen Avoid Downtime Shadow IT Colocation IoT Trending Charger Outlook Word Document Management Hard Drives Identity Spyware Files Legislation Managed IT Service Experience Google Assistant iOS Language Administrator Lithium-ion battery Windows Ink server installation dvd "cannot install required files" Data Privacy Comparison stock Computer Forensics Video Games Computer Fan Virtual Reality Relocation Access Evernote Regulation Google Maps Scam Hard Drive Edge Specifications tweet Screen Mirroring Music Dark Web Virus Networking Sync Software as a Service Employer Employee Relationship calculator Meetings PDF Chromebook Ciminal Sales Twitter Cast Analytics Emails Instant Messaging Proactive Workers Adobe Keyboard control Computer Accessories Settings Worker Commute Text Messaging Smart Tech Retail Mobile Device WSJ Cache Monitors Remote Monitoring Emergency CrashOverride Thank You Worker Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...