4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

4IT can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at 305-278-7100 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Business IT Services Google Efficiency Innovation Windows IT Support Hardware Disaster Recovery Workplace Tips Saving Money Computer Upgrade Miscellaneous VoIP Business Continuity Windows 10 Virtualization Data Mobile Devices Server Mobile Device Management Mobile Computing User Tips Network Security Communication Network Save Money Alert Quick Tips Going Green Mobile Office Email Information Technology Social Media Smartphones BYOD Smartphone Apps Health Small Business communications Microsoft Office Office Operating System Gadgets Android Application Ransomware Disaster Managed IT Services Outsourced IT Tablet Browser Firewall Avoiding Downtime BDR Productivity Risk Management Search Holiday WiFi Chrome The Internet of Things Mobility Remote Computing Unified Threat Management IT Solutions Passwords Automation Managed IT Hacking History Remote Monitoring Best Practice Data Management Facebook Telephone Systems Employer-Employee Relationship Hard Drives Spam Vendor Management Budget Saving Time Office Tips Cybersecurity Customer Relationship Management VPN Wireless Technology Password Cybercrime Apple Hosted Solution Big Data Marketing Recovery Humor User Error Administration Lithium-ion battery Wearable Technology Collaboration iPhone Law Enforcement Maintenance Antivirus PowerPoint Virus Social Current Events Phishing Printer Computers Telephony Money USB Content Filtering Bring Your Own Device Analytics Phone System Gmail Router Proactive IT Point of Sale Government App IT COnsultant Save Time Cost Management Computer Repair Intranet Bandwidth Printer Server HaaS Work/Life Balance Laptop OneNote Business Intelligence Office 365 Trending Users Education Net Neutrality Windows 8 Social Engineering Tech Support Wireless Private Cloud Encryption Google Drive Cloud Computing Mouse Internet Exlporer Uninterrupted Power Supply online currency Internet of Things Two-factor Authentication Identity Theft Data Protection Solid State Drive Managing Stress SaaS Flexibility Audit Efficency Samsung Social Networking Shortcut IT Support Customer Service Update Biometrics Retail Virtual Reality hacker Display Meetings Personal Information Transportation Augmented Reality Instant Messaging Robot Emails Paperless Office Computer Care Battery HIPAA Entertainment Outlook Fax Server Unsupported Software Automobile Network Congestion Benefits End of Support Workplace DDoS Computer Accessories Help Desk Streaming Media Compliance Cast Distributed Denial of Service Legal Touchpad Mobile Device Windows 10s Nokia Twitter Managed Security Nanotechnology WIndows 7 Inbound Marketing Scam Data Security eWaste Regulations Surge Protector Hard Disk Drive Television Root Cause Analysis Value 3D Printing Employer Employee Relationship HBO Excel Sports Operating Sysytem Cameras Worker Commute best practices CrashOverride PDF User IT Management Scalability Science Files data breach Virtual Desktop Presentation ISP Safety Settings Bluetooth Text Messaging Best Available Chromecast Travel IT Technicians How To Wi-Fi risk management Hard Drive Programming Blogging Upgrades Emergency SharePoint Artificial Intelligence Administrator Training Applications Windows 10 Images Colocation Website Consultant Uograde The Blindside Of Commerce Teamwork Access Busines Continuity Company Culture Black Market Politics Vulnerability Networking Near Field Communication OneDrive Touchscreen Amazon IT Security Data Recovery Co-managed IT Cleaning Experience iOS Human Resources IT consulting Keyboard Managed IT Service Running Cable Avoid Downtime Wiring Managed IT Services Information Music Computer Fan Reliable Computing Ebay Computing Hiring/Firing Data Storage Bloatware Data storage Debate Books Dark Web Smart Technology Screen Mirroring Video Games Document Management Data Breach Data Backup Branding Advertising Storage Taxes IT service Supercomputer Electronic Medical Records Domains IT Budget Gift Giving WIndows Server 2008 Reputation Microblogging Youtube Buisness Sales Managed Service Provder Webinar Shadow IT Relocation Lifestyle Webinar IT solutions Tutorial