4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

4IT can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at 305-278-7100 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity VoIP Computer Saving Money Windows 10 Miscellaneous Virtualization User Tips Upgrade Mobile Devices Mobile Device Management Data Server Mobile Computing Network Security Email Network Save Money Microsoft Office Alert Communication Quick Tips communications Information Technology Social Media Smartphones BYOD Going Green Mobile Office Small Business Smartphone Android Health Apps Office Chrome Gadgets Outsourced IT Application Ransomware Browser Operating System Productivity Firewall Managed IT Services Avoiding Downtime Disaster Tablet Holiday WiFi The Internet of Things Managed IT Remote Computing Unified Threat Management IT Solutions Passwords Spam Mobility BDR Cybercrime Search Risk Management Telephone Systems History Remote Monitoring Automation Facebook Cybersecurity Hacking Best Practice Hard Drives Data Management Saving Time Vendor Management Employer-Employee Relationship Budget Customer Relationship Management Recovery Phone System VPN Wireless Technology Office Tips Big Data Apple Law Enforcement Marketing Phishing Proactive IT Password Hosted Solution Computers Collaboration Maintenance PowerPoint Current Events Virus Printer USB Antivirus Content Filtering Shortcut Analytics Bring Your Own Device Office 365 Social Router Gmail User Error Telephony Humor Money Lithium-ion battery Administration Wearable Technology iPhone Cloud Computing Google Drive OneNote Save Time Education Trending Net Neutrality Users Windows 8 HaaS Tech Support Work/Life Balance Business Intelligence Outlook Encryption Data Recovery App Government Point of Sale Social Engineering IT COnsultant Cost Management Intranet Computer Repair Bandwidth Wireless Printer Server Private Cloud Unsupported Software Data Backup Laptop Mouse Compliance Internet Exlporer Social Networking Internet of Things Two-factor Authentication Identity Theft Managing Stress Solid State Drive Display Data Protection SaaS Excel Flexibility Audit Augmented Reality Paperless Office IT Support Samsung Travel Fax Server Wi-Fi Emergency Update Customer Service Vulnerability Workplace Network Congestion Applications Biometrics Streaming Media Retail Virtual Reality hacker Uninterrupted Power Supply Help Desk Personal Information online currency Meetings Transportation Data Storage Computer Care Instant Messaging Battery Emails Robot HIPAA Automobile Entertainment End of Support Benefits Computer Accessories Efficency DDoS Nanotechnology Document Management Programming Advertising Blogging Branding Data Security Data Breach Hard Disk Drive Legal Distributed Denial of Service Tablets Mobile Device Hard Drive Root Cause Analysis Touchpad Website HBO Managed Security WIndows 7 eWaste NFL Scam best practices Inbound Marketing Uograde Images CrashOverride Regulations OneDrive IT Management Word Employer Employee Relationship data breach Value Amazon Sports Co-managed IT Settings Worker Commute Cameras Operating Sysytem User PDF WIndows Server 2008 Science risk management Scalability Files Virtual Desktop Presentation Best Available Text Messaging Ebay Bluetooth Patch Management Safety IT Technicians Wiring Windows 10 How To Computing Chromecast Information Upgrades Commerce Artificial Intelligence SharePoint Regulation Debate Training Administrator Consultant Colocation The Blindside Of Teamwork Sync Company Culture iOS Black Market Busines Continuity Access Touchscreen Networking Managed IT Service Politics Near Field Communication IT Security Managed IT Services Twitter Adobe Cleaning Computer Fan Nokia Surge Protector Human Resources Experience IT consulting Keyboard Avoid Downtime Television Running Cable Licensing Dark Web 3D Printing Screen Mirroring Music Reliable Computing Hiring/Firing Bloatware Data storage Cast Books ISP Smart Technology Windows 10s Video Games Youtube Storage Microblogging Taxes IT service Sales Supercomputer Domains Electronic Medical Records Managed Service Provder Webinar Windows Ink Lifestyle IT Budget Reputation Buisness Tutorial Shadow IT Relocation Webinar IT solutions Mobile Gift Giving Professional Services