SF Technotes

Cyberattacks on Smart Devices Escalate

By Michael Castelluccio
October 23, 2019
3 comments

On October 15, 2019, in Woburn, Mass., the multinational cybersecurity firm Kaspersky Lab issued a press release summarizing the results from its annual effort to measure cyberattacks on smart devices. The numbers for the first six months of 2019 are discouraging. The company reports, “Kaspersky honeypots detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of 2019.”

 

Internet of Things devices include everything from routers to security cameras and smart speakers in the home, and IoT Analytics estimates there are about seven billion internet-connected devices in 2019. The method used by Kaspersky to catch and track the smart device attacks involved setting digital traps called honeypots, more than 50 deployed around the world to track the 20,000 infected sessions appearing every 15 minutes.

 

The press release notes that the new total is almost nine times greater than the number found in H1 2018. Last year, about 12 million attacks were identified in H1, originating from 69,000 different IP addresses. Two contributing factors for the increase are the fact that IoT devices can be easier to hack than more sophisticated systems, and that the ways to monetize the effort are flowering.

 

The report explains how the majority of attacks download the most popular malware families like Mirai (responsible for 39% of attacks) and Nyadrop (seen in 38.57% of attacks). The Mirai malware makes network devices convert to remotely controlled bots to be used in massive numbers for large-scale network attacks. The Nyadrop malware is a Linux Trojan used as a tool to load other malware.

 

HONEYPOTS

 

Wikipedia describes a digital honeypot as “a computer security mechanism set to detect, deflect, or, in some manner to counteract attempts at unauthorized use of information systems.” The honeypot is data that looks like it’s part of the device’s or network’s code, when actually it’s isolated and constantly monitored.

 

It can be designed to look like something valuable to the attacker. Once the attack is detected, the honeypot tracks the attacker’s information, including the location of its source. The trap blocks the malware’s efforts by isolating its code and operations from the rest of the system.

 

A typical placement in the system can look like this:

 

 

Honeypot diagram from Wikipedia Commons

 

Along with the numbers and kinds of attacks, the honeypot logs the location of the attackers, and although these numbers change often, the current list of countries in the top five hacker locations includes China, Brazil, Egypt, Russia, and the United States.

 

 

Graphic from Kaspersky Lab

 

RECOMMENDATIONS

 

Kaspersky offers two lists of advice for individuals and companies to avoid what’s becoming an ever-increasing wave of attacks coming from around the globe.

 

To keep your devices safe, the Kaspersky Lab suggests that users:

  1. Install updates for the hardware you use as soon as you are notified of their availability.
  2. Always change preinstalled passwords. Use complicated passwords that include uppercase and lowercase letters, numbers, and symbols.
  3. Reboot a device as soon as you think it’s acting strangely. Keep in mind, however, that this might help get rid of existing malware, but it doesn’t reduce the risk of getting another infection.
  4. Keep access to IoT devices restricted by a local VPN (virtual private network), allowing you to access them from your home network, instead of publicly exposing them on the internet.

 

For companies, the cybersecurity firm suggests:

  1. Use threat data feeds to block network connections originating from malicious network addresses detected by security researchers.
  2. Make sure all device software is up to date. Unpatched devices should be kept in a separate network inaccessible by unauthorized users.

 

(The full text of the Kaspersky report, IoT: a malware story, can be read on the Securelist website .

 



Michael Castelluccio has been the Technology Editor for Strategic Finance for 24 years. His SF TECHNOTES blog is in its 21st year. You can contact Mike at mcastelluccio@imanet.org.


3 + Show Comments

3 comments
    tyson001 October 28, 2019 AT 7:24 am

    I guess it’s on a similar topic as cyberattacks, but I recently got to know of how cyberstalking works, and it’s soooo creepy. I found this interview with a White Hat Hacker (which is a new phrase for me, and it basically says that these hackers defend common good and are not the “bad” ones). The interview was really interesting https://surfshark.com/blog/interview-with-an-ethical-hacker-part-i

    hagazi October 25, 2019 AT 4:49 pm

    Surprised N Korea is not visible as a hacker state

    Venkataraman Govindarajan October 25, 2019 AT 4:13 pm

    article of interest