MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

MERIT Solutions can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at (757) 420-5150 to get started. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 24 August 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Hosted Solutions Backup Internet Software Network Security google Productivity Computer Windows 10 Business Microsoft Disaster Recovery IT Services Business Continuity Managed IT Services VoIP Innovation Hardware IT Support Business Management communications Outsourced IT User Tips Mobile Devices Windows Efficiency Email Mobility Productivity Save Money Saving Money Telephone Systems Managed IT Server Ransomware Smartphone Operating System Hosted Solution Mobile Device Management Quick Tips Apps Virtualization Law Enforcement Information Technology Cybercrime Recovery Passwords browser Password Small Business Android Data BDR Chrome Money Computers Communication Unsupported Software VPN Facebook Budget Wireless Cybersecurity Hacking BYOD Avoiding Downtime Health Social Miscellaneous upgrade Current Events Office tips Private Cloud search App Office 365 Social Media Cloud Computing Smartphones Government USB Data Management Save Time Risk Management Gadgets Workplace Tips Microsoft Office Google Drive Work/Life Balance Automation Telephony Alert Firewall Application Managed Service Provider WiFi Robot Battery Applications History Saving Time HaaS Going Green End of Support Bandwidth Remote Computing Office Computer Care Proactive IT Personal Information Phishing Cleaning Best Practice Internet of Things Automobile The Internet of Things Users Disaster Humor Employer-Employee Relationship Phone System Data Backup Gmail Shortcut Network Cost Management Update Identity Theft IT solutions Hacker Data Storage Solid State Drive Internet Exlporer Samsung Wireless Technology DDoS Holiday Flexibility Audit Television Spam Social Engineering Compliance Mobile Computing Wi-Fi Streaming Media Transportation Antivirus Meetings Two-factor Authentication Content Filtering HBO domain Entertainment Vulnerability Settings Touchscreen Electronic Medical Records Uninterrupted Power Supply Point of Sale Data Protection Artificial Intelligence Laptop remote Yahoo HIPAA iOS eWaste IT Support Black Market IT Management Running Cable Touchpad Scam Server 2008 Reputation Ali Rowghani Politics Avoid Downtime Computer Fan Commerce Trending Advertising Managed IT Services Shadow IT Document Management WIndows Server 2008 User Error Employer Employee Relationship Experience Dark Web Data Recovery Data Breach Data storage Keyboard server installation dvd "cannot install required files" Patch Management Computer Accessories Administration Mobile Device stock Chromecast Video Games Business Intelligence Emails Virtual Reality Sports Outlook Marketing Colocation tweet Music Legal Nanotechnology Encryption Managed IT Service Hard Drives Hiring/Firing Tech Support Vendor Management calculator Files Excel Webinar SaaS Twitter Administrator Analytics Lithium-ion battery Root Cause Analysis Instant Messaging Benefits control Worker Commute Regulation IT solutions Relocation Unified Threat Management WSJ Access Big Data Augmented Reality Managing Stress Screen Mirroring Exchange Training altivista Sync Windows 10s Distributed Denial of Service iPhone Upgrades Books Scalability Education Cast PDF SBS Company Culture compaq Adobe Router Hard Disk Drive OneNote Consultant Apple How To Data Security Text Messaging Wearable Technology Smart Technology Value hp Windows 10

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.