4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

4IT can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at 305-278-7100 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Business Management Hosted Solutions Managed Service Provider Google Malware Business IT Services Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Mobile Devices User Tips Saving Money Computer Miscellaneous Windows 10 Network Security Virtualization Upgrade Mobile Device Management Data Server communications Mobile Computing Email Alert Save Money Microsoft Office Communication Network Social Media Smartphone Quick Tips Small Business Smartphones Managed IT Services Information Technology Outsourced IT BYOD Going Green Mobile Office Android Health Office Apps Application Ransomware Operating System Chrome Browser Gadgets Productivity Holiday Managed IT Firewall The Internet of Things Avoiding Downtime Cybersecurity Disaster Tablet Mobility WiFi Cybercrime Search Telephone Systems Data Backup Passwords Remote Computing Unified Threat Management IT Solutions Risk Management Spam Best Practice Data Management History BDR Data Recovery Apple Employer-Employee Relationship Budget VPN Vendor Management Marketing Automation Facebook Hacking Hard Drives Saving Time Remote Monitoring User Error Hosted Solution Computers Collaboration Recovery Phone System Wireless Technology Law Enforcement Big Data Office Tips Content Filtering iPhone Customer Relationship Management Proactive IT Phishing Password Money Intranet Lithium-ion battery Telephony Bring Your Own Device Current Events Work/Life Balance Printer Humor Administration USB Office 365 Antivirus Wearable Technology Analytics Encryption Shortcut Gmail Router Social Vulnerability Maintenance PowerPoint Government Virus Social Engineering Wireless Users Unsupported Software Windows 8 Bandwidth Google Drive Printer Server Cloud Computing Laptop Save Time Private Cloud OneNote Data Protection Data Security Trending Education Flexibility Net Neutrality Point of Sale IT COnsultant SaaS Tech Support Computer Repair Audit HaaS Outlook Politics Business Intelligence Personal Information App Cost Management Meetings Automobile Redundancy End of Support Data Storage Instant Messaging Emails Data Breach HIPAA Internet Exlporer Efficency Entertainment Benefits Internet of Things DDoS Computer Accessories Identity Theft Solid State Drive Compliance Sports Network Congestion Mouse Help Desk Display Two-factor Authentication Managing Stress Augmented Reality Samsung Excel Wi-Fi Emergency Artificial Intelligence Paperless Office Applications IT Support Fax Server Travel Windows 10 Workplace hacker Transportation Update Streaming Media Customer Service Social Networking Biometrics Uninterrupted Power Supply Retail Data Loss online currency Robot Computer Care Virtual Reality Battery Managed IT Services Surge Protector Uograde Hiring/Firing Images Adobe Google Docs Data storage Computer Fan Television Human Resources Books 3D Printing IT consulting Running Cable Smart Technology Video Games Licensing Document Management Microsoft Excel Dark Web Reliable Computing Advertising Screen Mirroring ISP Legal Bloatware File Sharing Touchpad Mobile Device Managed Security Wiring Cast Windows 10s Information Scam Programming Blogging systems Nanotechnology Debate Branding Hard Disk Drive Distributed Denial of Service Employer Employee Relationship Tablets Website Worker Commute hack Operating Sysytem Root Cause Analysis WIndows 7 PDF HBO Inbound Marketing Files best practices eWaste OneDrive Storage Scalability NFL Cortana Amazon Regulations CrashOverride Safety Text Messaging IT Management Co-managed IT Value Chromecast data breach Nokia Project Management How To Word Legislation Cameras Settings Upgrades User WIndows Server 2008 Lifestyle Administrator risk management Training MSP Science Windows Ink Ebay Virtual Desktop Computing Presentation Colocation Consultant Bluetooth The Blindside Of Best Available Patch Management Access IT Technicians Company Culture Black Market Google Maps Commerce Touchscreen SharePoint IT Security Regulation Software as a Service Cleaning Experience Teamwork Keyboard Hard Drive Avoid Downtime Sync Busines Continuity iOS Twitter Networking Music Near Field Communication Managed IT Service Device Security Sales Webinar Devices Managed Service Provder Webinar Credit Cards IT solutions Gift Giving Spyware Mobile FAQ Fraud Professional Services Taxes Charger Edge Supercomputer Electronic Medical Records Wireless Charging Ciminal IT Budget IT service WannaCry Reputation Domains Evernote Comparison Workers Blockchain Specifications Updates Tutorial Identities Shadow IT Buisness Conferencing Relocation Microsoft Word Microblogging Gifts Youtube