4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

Warning: It’s Only a Matter of Time Before the Next IoT Botnet Strikes

The Internet of Things is all around us, in our homes, our offices, and even our cars. While this connectivity can provide a more unified and automated approach to daily tasks, it has the downside of enabling certain security threats to go unfettered. A prime example are the IoT-driven botnets that seem to be increasing in popularity.

What is the IoT, and What’s a Botnet?
The Internet of Things (IoT) is a blanket term describing any item that collects data and connects to the Internet to process that data. Think everything from fitness trackers to smart home assistants, smart watches, and internet-capable security cameras. If you have any device that is described as “connected” or “smart,” you’ve interacted with the IoT. These kinds of devices are becoming more and more commonplace in everyday life.

The big problem with IoT devices is that there is little, if any, attention devoted to maintaining their security. This, combined with their reliance on an Internet connection to function, make them perfect for building the online threat known as a botnet.

A botnet is a network of devices utilized as an attack vector. By infecting numerous pieces of hardware, an attacker is able to leverage their combined resources as part of a brute force attack, overwhelming the targeted system’s security. We’ve seen this before, including events that took down dozens of popular websites on the Internet all at once.

A Bad Memory Comes Back Again
There are plenty of examples of IoT botnets, but a particularly nasty one, Mirai, has made headlines again as a new derivative botnet has begun to rise. Called Persirai, this botnet leverages the same IP cameras as Mirai to power its attacks. Persirai has been making its rounds around China, infecting thousands of devices.

Of course, there are other botnets that warrant concern as well. A currently-dormant botnet, called Hajime, was measured by Kaspersky Labs to have almost 300,000 IoT devices powering it. The researchers also noted that it was very well-written and put together. As a result, should the idle botnet be put to use (as experts suspect is very likely will) it could very easily be as potent as Mirai was.

How You Can Protect Your Business
Fortunately, many botnet-powered DDoS attacks can be avoided through some relatively simple preventative measures that are in line with recommended business continuity best practices. For example, keeping your data on multiple, distinct locations will help keep it safe should you find your business to be the target of such an attack. Furthermore, it never hurts to have a firewall put into place, as many varieties of DDoS attacks can be mitigated by them.

4IT can help you to implement these measures to protect your business against threats that come from misused IoT devices. Give us a call at 305-278-7100 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Virtualization Windows 10 Upgrade Miscellaneous Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Email Alert Save Money Microsoft Office Communication Network Quick Tips Smartphone Small Business communications Information Technology BYOD Going Green Mobile Office Social Media Smartphones Office Apps Android Health Operating System Ransomware Chrome Managed IT Services Outsourced IT Browser Gadgets Application Holiday Productivity Firewall Managed IT Avoiding Downtime Disaster Tablet WiFi Mobility Passwords Telephone Systems The Internet of Things Remote Computing Unified Threat Management Cybersecurity Risk Management IT Solutions Spam Best Practice Data Management BDR Cybercrime Search Employer-Employee Relationship Vendor Management Budget VPN Automation Facebook Hacking Hard Drives Remote Monitoring History Saving Time Apple Data Backup Wireless Technology Marketing Recovery Phone System Big Data Law Enforcement Office Tips Content Filtering iPhone Customer Relationship Management Proactive IT Data Recovery Phishing User Error Password Money Hosted Solution Collaboration Computers Telephony Bring Your Own Device Current Events Humor Printer Administration Work/Life Balance USB Wearable Technology Analytics Encryption Antivirus Office 365 Maintenance Gmail PowerPoint Router Shortcut Virus Government Social Vulnerability Lithium-ion battery Laptop Google Drive OneNote Cloud Computing Private Cloud Save Time Education Trending Data Security Net Neutrality Point of Sale Data Protection IT COnsultant Computer Repair Tech Support SaaS Audit Outlook HaaS Business Intelligence App Politics Personal Information Users Cost Management Windows 8 Intranet Social Engineering Bandwidth Printer Server Wireless Unsupported Software Instant Messaging End of Support Emails Efficency HIPAA Entertainment Network Congestion Benefits Internet Exlporer Computer Accessories DDoS Help Desk Internet of Things Mouse Compliance Identity Theft Solid State Drive Display Flexibility Sports Two-factor Authentication Augmented Reality Managing Stress Excel Paperless Office Samsung Fax Server Wi-Fi Emergency IT Support Artificial Intelligence Workplace Social Networking Travel Applications Windows 10 Streaming Media Customer Service hacker Uninterrupted Power Supply Update Biometrics online currency Retail Transportation Virtual Reality Computer Care Meetings Battery Robot Data Storage Automobile Books Dark Web ISP Wiring Microsoft Excel Smart Technology Screen Mirroring Information Video Games Reliable Computing Document Management Data Breach Debate Bloatware Advertising Programming Blogging File Sharing Cast Legal Touchpad Mobile Device Windows 10s Managed Security Nanotechnology Website systems Scam Branding Tablets Distributed Denial of Service Hard Disk Drive Root Cause Analysis OneDrive hack Employer Employee Relationship HBO Nokia WIndows 7 Amazon Storage Operating Sysytem Inbound Marketing Co-managed IT NFL eWaste Worker Commute best practices CrashOverride PDF Regulations Cortana IT Management Scalability Files Value Lifestyle Word data breach Safety Settings Text Messaging Cameras Ebay Legislation WIndows Server 2008 How To User Chromecast Computing Science Upgrades Windows Ink risk management Virtual Desktop Presentation Training Patch Management Bluetooth Best Available Administrator Colocation Consultant Google Maps IT Technicians The Blindside Of Commerce Hard Drive Company Culture Regulation SharePoint Black Market Access Touchscreen Software as a Service IT Security Uograde Images Twitter Cleaning Sync Teamwork iOS Busines Continuity Surge Protector Data Loss Experience Television Keyboard Managed IT Service Networking Avoid Downtime Near Field Communication 3D Printing Adobe Managed IT Services Music Computer Fan Google Docs Hiring/Firing Human Resources IT consulting Data storage Licensing Running Cable Gift Giving Mobile IT solutions Professional Services Taxes Supercomputer Electronic Medical Records IT service IT Budget Domains Reputation Comparison Tutorial Specifications Microblogging Youtube Buisness Shadow IT Sales Relocation Managed Service Provder Webinar Webinar