MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

MERIT Solutions can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at (757) 420-5150 to get started. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Best Practices Privacy Business Computing Hackers Software Malware Network Security Hosted Solutions Backup google Internet Productivity Microsoft Computer Disaster Recovery Business Continuity Managed IT Services Windows 10 VoIP Business IT Support IT Services Innovation User Tips Outsourced IT Hardware Mobile Devices Business Management Email Mobility communications Productivity Windows Managed IT Ransomware Mobile Device Management Efficiency Smartphone Server Cybercrime Saving Money Data Backup Save Money Telephone Systems Small Business Apps Operating System Law Enforcement browser Hosted Solution Quick Tips Android Virtualization Cybersecurity BDR VPN Money Passwords Information Technology Password Recovery Data Recovery Microsoft Office Chrome BYOD Data Health Miscellaneous Managed Service Provider Computers Facebook Government Office 365 Gadgets Budget Smartphones Wireless Holiday Data Management Unsupported Software Social upgrade Cloud Computing Google Drive Hacking Avoiding Downtime Communication Work/Life Balance Alert Managed IT Services Wi-Fi Firewall User Error Application Office tips Applications Private Cloud Current Events Audit Data Security Proactive IT Social Media Best Practice Personal Information Politics Workplace Tips USB Save Time Risk Management Identity Theft search Phishing App Automation Shortcut Telephony Data Storage Mobile Computing Cost Management Transportation SaaS Robot Antivirus Samsung Content Filtering History Remote Computing Battery End of Support HaaS Gmail Compliance Google Docs Internet of Things Update The Internet of Things Automobile Humor IT solutions Disaster Two-factor Authentication Data Protection Collaboration DDoS IT Support Employer-Employee Relationship Saving Time Cleaning Office Phone System Commerce Network Television Sports Computer Care Social Engineering Apple Streaming Media Users Encryption Hacker Windows 10 Solid State Drive Internet Exlporer WiFi Wireless Technology Vulnerability Artificial Intelligence Spam Going Green Bandwidth Flexibility iPhone Books Comparison Scalability Computer Fan Running Cable Hiring/Firing Server 2008 Education Regulation Google Maps Text Messaging Router OneNote Vendor Management Ali Rowghani Specifications How To Screen Mirroring Data Breach Trending Dark Web Benefits Sync Software as a Service Meetings Unified Threat Management Sales Cast Emails server installation dvd "cannot install required files" Adobe Entertainment Data Loss Settings Laptop Uninterrupted Power Supply Training stock Upgrades Electronic Medical Records Retail Marketing Point of Sale Licensing HIPAA Touchpad Company Culture tweet Consultant Conferencing Black Market HBO Reputation Webinar Advertising Smart Technology calculator Mobile Microsoft Excel Avoid Downtime Value Twitter Gifts control Shadow IT IT solutions Data storage Document Management Professional Services Experience File Sharing WSJ Chromecast Exchange IT Management Administration Windows 10s Nanotechnology Distributed Denial of Service altivista Travel Storage Video Games Credit Cards SBS Virtual Reality WIndows Server 2008 Colocation Hard Disk Drive Hard Drives Root Cause Analysis Tech Support Scam compaq Tablets Music Cortana Legal Files Administrator Wearable Technology Lithium-ion battery FAQ Patch Management Augmented Reality Employer Employee Relationship hp NFL Analytics Lifestyle Business Intelligence Touchscreen Access Keyboard domain Instant Messaging Outlook Relocation Word Computer Accessories Worker Commute Big Data Legislation Managed IT Service Mobile Device iOS remote Managing Stress Excel Windows Ink PDF eWaste Yahoo Thank You WannaCry Congratulations Cache Safety Monitors Remote Monitoring Emergency Redundancy Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...