https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


White Zombie

3 Types of Cyberzombies to Watch Out For

Hackers are like undead cybermonsters, just looking for a way to break into your network. Are you prepared?
  • Written by Brian Buntz
  • 25th February 2017

“The supreme art of war is to subdue your opponent without fighting.” —Sun Tzu

Cybersecurity is a lot like the zombie marathon: you don’t have to be a cybersecurity ninja to avoid being eaten, Chase Cunningham, Ph.D., A10 Networks’ director of cyber operations is fond of saying. “You just have to be faster than the guy next to you,” Cunningham adds, who is a Navy veteran specializing cyber forensics and analytic operations.

But how well do you understand the zombie part of the equation? The mainstream media frequently treats these characters as some sort of monolithic “bad guy,” frequently invoking images of hoodie-wearing hackers hiding out in a basement someplace. And then there are others who think of hackers in terms of hats: white, black, gray, and green hats, and so on. But in the end, there are only only a few different categories of cyberzombies, Cunningham says.

1. Undead Script Kiddies

There are frequently teenagers or 20-somethings who don’t have much to do and are smart, and they have too much time on their hands, Cunningham says. “They’ll just break stuff because they can. They do it almost for the sake of: ‘look at what I can do and look at how awesome I am.’”

These script kiddie types do things like launch an IoT device-fueled DDoS attack against their school or hack into baby monitors just for the thrill of it.

While they can inflict damage, script kiddies are among the least threatening type of hackers for businesses.

2. Nation State Hacker Zombies

Every country has cyber operations, and the people who work in this field often have highly sophisticated training. “These are like the one percenters,” Cunningham says.

Nation-state hackers are not generally much of a threat to most businesses. “Every once in awhile, you get someone who is pissed at the world and causes problems, but a lot of them are usually super helpful and nice people,” Cunningham explains.

Such hackers, however, are among the most advanced in the world, carrying out attacks that would be impossible for others. Such actors were likely behind the Stuxnet attack that caused physical damage to Iran’s nuclear facilities in 2010. And Kaspersky notes that the elite Equation Group has rewritten hard-drive firmware of infected computers, an unprecedented feat.

3. Undead Cybermobsters

These are the cybercriminals who represent a real threat to your business. They tend to be financially motivated, using ransomware attacks and other types of malware for personal enrichment. They can be based anywhere in the world but are concentrated in cybercrime hotspots such as in Eastern Europe, China, and Nigeria. “A large percentage of those folks tend to be college graduates who don’t have anything to do with their skill set, and they are looking for easy money,” Cunningham says. “If you have a computer science degree and you are handed an envelope full of money to work on malware, what are you going to do?” he adds. “Mexico is starting to deal with it, too. There are a bunch of computer science grads in Mexico. There aren’t many computer-science opportunities in Latin America,” Cunningham explains. The cartels know that, and they are getting into ransomware and forming cybercriminal gangs.

The bottom line is: If you have your IoT developed overseas, you should pay close attention to what your developers are doing.

There are also a substantial number of part-time cybercriminals. “They are the Batman type,” Cunningham says. “By day, they are writing programs at work, and in the evening, they go and set up botnets and ransomware.”

One of the reasons that cybercrime is so prevalent is that it’s hard to prosecute the people who are responsible for it. “If they are in the U.S., cybercriminals should worry. But anywhere else, big deal. How do you even find a court overseas where they know what the hell you are talking about?” Cunningham says. “Are you going to stand in front of a judge who has sat in front of a bench for four years? You might as well be reading hieroglyphics. And then you have the challenge of convincing the jury. How would you ever get the point across? You can’t get security leadership to understand some of these concepts much less the general populace.”

Note: IoT security is a key item on the agenda at Internet of Things World in Santa Clara this May. Check out the speakers, preview the agenda, claim your free expo pass or book your place at the conference for the world’s biggest IoT event now.

Images in article from Thinkstock except for the bottom image, which is from Ali Jalali. Hero image is from the public domain. 

Tags: Article Security Technologies

Related


  • 3d rendering of human brain on technology background
    AI Ups the Ante for IoT Cybersecurity
    Security providers in IT and OT have implemented AI, ML and other advanced technologies to make systems smarter than malicious attackers.
  • IoT security
    Protecting Your Network Against Ripple20 Vulnerabilities
    Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • COVID-19 Driving Data Integration Projects in IoT
  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021
IoTWorldToday, IoTWorldSeries

The eSIM Cookbook – Towards the Next Generation of Connected Devices dlvr.it/RtG5bB https://t.co/5kXa8Pnv4T

22nd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X