MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

MERIT Solutions can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at (757) 420-5150 to get started. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup Managed IT Services google Business Management Productivity Microsoft Disaster Recovery Computer Business IT Support communications Mobile Devices VoIP Outsourced IT Business Continuity Windows 10 User Tips Hardware Innovation Productivity IT Services Email Cybercrime Data Backup Windows Mobility Mobile Device Management Managed IT Server Small Business Efficiency browser Ransomware Apps Smartphone Cybersecurity Operating System Saving Money Telephone Systems Data Recovery Internet of Things Save Money Hosted Solution Quick Tips Passwords Android Virtualization Law Enforcement Recovery VPN Data Security Microsoft Office Office 365 BYOD Password Data Holiday BDR Money Phishing Information Technology Chrome Smartphones Data Management Wi-Fi Facebook Government Update Google Drive Hacking IT Support Avoiding Downtime Automation Gadgets Alert Wireless Health Miscellaneous Managed Service Provider Computers Risk Management Vulnerability Unsupported Software Social upgrade Best Practice Social Media Cloud Computing App Communication Work/Life Balance Budget Firewall User Error Application Antivirus Current Events Audit Wireless Technology Personal Information Collaboration Politics Two-factor Authentication Workplace Tips Telephony USB Save Time Windows 10 Office tips Social Engineering Applications Private Cloud History Spam Proactive IT Identity Theft Managed IT Services search The Internet of Things Flexibility Shortcut Data Breach Cost Management Employer-Employee Relationship SaaS Blockchain Network Sports Data Loss Marketing Samsung Content Filtering Tech Support Battery Google Docs HaaS Hacker Solid State Drive Gmail Internet Exlporer Compliance Data Protection Automobile Redundancy Fraud iPhone IT solutions Tech Term Commerce DDoS Mobile Computing Transportation Saving Time Cleaning Office Cortana Robot Phone System Patch Management Television Computer Care Remote Computing Apple Project Management Legal End of Support Streaming Media Users Encryption WiFi Excel Artificial Intelligence Data Storage Going Green Bandwidth Humor Disaster OneNote eWaste Data storage Books Networking IT budget Scalability Sync Dark Web Meetings Running Cable Hiring/Firing Server 2008 Education Software as a Service Ali Rowghani Sales Maintenance Router Cast Emails Administration Vendor Management Chromecast Trending Workers How To Adobe Settings Benefits Retail Device Security Colocation Hard Drives Unified Threat Management Updates Identities Licensing WannaCry Files server installation dvd "cannot install required files" Administrator stock Entertainment Conferencing Devices Lithium-ion battery HBO Webinar Training Upgrades Electronic Medical Records Microsoft Word IoT Mobile Point of Sale Microsoft Excel Access tweet HIPAA Gifts Spyware IT solutions Relocation Company Culture Consultant Language Black Market Professional Services Smart Technology calculator File Sharing Twitter Avoid Downtime IT Management Windows 10s Value PDF control Shadow IT Travel Nanotechnology Document Management Storage WSJ Experience Credit Cards Edge WIndows Server 2008 Hard Disk Drive Text Messaging Virus Exchange Tablets Root Cause Analysis Distributed Denial of Service altivista FAQ Ciminal Video Games Proactive SBS Virtual Reality NFL Augmented Reality Business Intelligence Touchscreen Scam compaq Lifestyle Music Charger Outlook Laptop Wearable Technology Websites Uninterrupted Power Supply Word Managed IT Service Employer Employee Relationship hp Legislation Analytics Wireless Charging MSP iOS Touchpad Keyboard domain Instant Messaging Windows Ink Reputation Computer Accessories Worker Commute Comparison Mobile Device Big Data Evernote intranet Regulation Computer Fan Advertising remote Managing Stress Google Maps Specifications Screen Mirroring Yahoo Cache Thank You Monitors Remote Monitoring Congratulations Safety Emergency Worker Data Theft CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...