In the News

Researchers at a cybersecurity firm say they have identified vulnerabilities in software widely used by millions of connected devices — flaws that could be exploited by hackers to penetrate business and home computer networks and disrupt them.
  • The influx of connected Internet of Things (IoT) devices has contributed to a 280% surge in annual data creation over the past five years.
  • The majority of this is considered Big Data.
  • Each IoT device is a potential target for a hacker. If a network is compromised, each connected device is potentially at risk.
  • As homes and cities get “smarter,” they also become more vulnerable.
High-wattage IoT devices and appliances, such as connected refrigerators, air conditioners and heaters, could be turned into massive botnets by malicious actors and used to influence energy prices, according to an academic study released at Black Hat 2020.

In their presentation, "IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets," researchers from the Georgia Institute of Technology describe how an "IoT Skimmer" - which consists of thousands of connected devices - could cause price fluctuations or create financial damage by targeting utility firms.
The United States Department of Justice yesterday sentenced a 22-year-old Washington-based hacker to 13 months in federal prison for his role in creating botnet malware, infecting a large number of systems with it, and then abusing those systems to carry out large scale distributed denial-of-service (DDoS) attacks against various online service and targets.
Security researchers have discovered a new malware called Kaji which is targeting IoT devices using SSH brute-force attacks.

Malware is increasingly targeting IoT devices, and it’s little surprise why. Statista estimates there are around 20 billion IoT devices installed today, while IDC predicts 41.6 billion devices generating 79.4 zettabytes of data by 2025.
Just like a traffic jam floods a highway with more cars than it can handle, a DDoS attack floods a website with more requests (i.e. visitors) than the web server or other related systems can handle.
“For consumers and organisations, be aware that devices you own are a likely target for attacks, and most likely today to be added into an existing botnet,”
A 21-year-old Washington man has pleaded guilty to creating botnets that converted hundreds of thousands of routers, cameras, and other Internet-facing devices into money-making denial-of-service fleets that could knock out entire Web hosting companies.
The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default usernames and passwords.
The digital assault surpassed 660 Gbps of traffic, making it one of the largest recorded in history in terms of volume.
480 new malware variants are being reported every minute according to a new report by security firm McAfee.
Security researchers have caught hackers lashing together Internet-connected devices in a botnet they’re calling Torii, which uses techniques not seen in an IoT botnet before—including intercepting and stealing data, and using the Tor Project network to hide its network traffic.
China is aggressively seeking to dominate the Internet of Things and plans to use access to billions of networked electronic devices for intelligence-gathering, sabotage, and business purposes, according to a forthcoming congressional report.
Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.