MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

MERIT Solutions can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at (757) 420-5150 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 June 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Hackers Best Practices Malware Hosted Solutions Backup Internet Computer Software Network Security Windows 10 google Productivity Business Microsoft Disaster Recovery Innovation Business Continuity Managed IT Services VoIP Hardware IT Services Business Management IT Support Mobile Devices Mobility Productivity communications Ransomware Efficiency Save Money Saving Money Windows Quick Tips Telephone Systems Apps Outsourced IT User Tips Smartphone Operating System Mobile Device Management Passwords Virtualization Data Server Small Business BDR Email Law Enforcement Information Technology Recovery Cybercrime VPN Facebook browser Managed IT Android Hacking Avoiding Downtime Wireless Password Health Miscellaneous Cybersecurity Money upgrade Social Communication Budget Hosted Solution Current Events Government Office 365 BYOD Automation Gadgets Telephony Cloud Computing Workplace Tips Alert USB Save Time Managed Service Provider Computers Office tips Private Cloud Chrome Social Media search App Work/Life Balance Smartphones Firewall Data Management Application Battery HaaS Saving Time Office Hacker Solid State Drive Microsoft Office Personal Information Internet Exlporer Gmail Computer Care Cleaning Wireless Technology Automobile Google Drive Update Unsupported Software Users DDoS Mobile Computing Transportation Holiday Robot Television Risk Management Applications Social Engineering History Remote Computing Streaming Media End of Support Identity Theft Best Practice Samsung WiFi Flexibility Internet of Things Going Green Audit The Internet of Things Bandwidth Humor Disaster Wi-Fi Employer-Employee Relationship Antivirus Two-factor Authentication User Error Content Filtering Windows 10 Network Sports Meetings Colocation Hard Drives Entertainment Tech Support Touchscreen Electronic Medical Records Vulnerability server installation dvd "cannot install required files" Files Administrator Lithium-ion battery stock Point of Sale HIPAA Phishing iOS Black Market Access Scam tweet Relocation Politics Avoid Downtime Data Breach Computer Fan calculator Shadow IT IT solutions Employer Employee Relationship Twitter iPhone Document Management PDF Experience control Emails Keyboard Dark Web Computer Accessories WSJ Text Messaging Phone System Exchange Video Games Mobile Device Marketing Distributed Denial of Service Shortcut Data Backup altivista Virtual Reality Music SBS Legal Cost Management Hiring/Firing Nanotechnology compaq Encryption Vendor Management Apple Artificial Intelligence Analytics Webinar Laptop Uninterrupted Power Supply SaaS Wearable Technology Benefits Root Cause Analysis hp Instant Messaging Proactive IT Worker Commute Big Data IT solutions domain Touchpad Unified Threat Management Augmented Reality Reputation Managing Stress Training Advertising Upgrades Books Windows 10s remote Scalability eWaste Compliance Spam Yahoo Education Data storage Router Company Culture Consultant Running Cable Hard Disk Drive Server 2008 How To Chromecast Smart Technology OneNote Ali Rowghani Administration Trending Value

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.