https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Malware

Where is all of the IoT malware hiding?

Many of the most prominent IoT exploits are from security researchers. But that doesn’t mean that IoT malware isn’t already treacherous.
  • Written by Brian Buntz
  • 31st August 2017

Given the significant attention dedicated to IoT security, there have been relatively few big IoT-specific attacks to hit the press. Exceptions include last year’s Mirai botnet, in which threat actors targeted the weak security of some 360,000 IoT devices to target DNS provider Dyn. A chunk of the internet went offline as a result. In 2010, there was Stuxnet — a zero-day exploit that caused physical damage to Iran’s nuclear centrifuges. And five years later, Russian IoT malware targeted Ukraine’s electrical grid, ultimately cutting off power to 230,000 people. Most recently, there was Stackoverflowin, software that commanded every online printer to print and then there was a leak of thousands of telnet credentials for IoT devices on Pastebin disclosed by Ankit Anubhav, principal security researcher at NewSky Security.

“While there is a lot of IoT threat talk, most of it amounts to presentations on ‘possible’ ways that IoT technology can be compromised,” Anubhav explained.

Security researchers often share their IoT-related exploits at the annual Defcon and Blackhat security conferences in Las Vegas. Examples include tales of hacked Jeeps, medical devices, semi trucks, drones and even car washes.

By contrast, the most notable cyberattacks of this year, from WannaCry to Petya, have targeted traditional IT infrastructure.

[IoT Security Summit, co-located with Blockchain360 and Cloud Security Summit, explores how industry-wide security, privacy and trust can be established to unlock the full potential of IoT. Get your ticket now.]

But a substantial amount of IoT malware is likely hiding in plain sight, said Kenneth Geers, a senior research scientist at Comodo Group and a NATO Cyber Centre ambassador. “My own thinking regarding IoT attacks is that if we are not seeing them, we are not looking in the right place,” he said.

Anubhav agrees, stating that the leak of IoT login credentials he recently disclosed was the tip of the iceberg of attacks he’s seen this year involving Internet of Things devices. “Maybe they are not all fancy, but they work,” Anubhav said. “And that’s all hackers want.”

There is evidence to support that such attacks are growing more common. Kaspersky indicates that IoT malware activity has more than doubled in the past year.

Among the active IoT-related security threats Anubhav has seen is a bug that allows a hacker to modify the temperature of the Heatmiser thermostat and malware known as NBotLoader that targets routers. There is also BrickerBot, a botnet (now in its fourth iteration) that renders insecure IoT devices unusable. To date, the malware has killed more than 2 million devices.

While consumer-centric attacks receive considerable attention, a significant portion of IoT malware likely relates to cyberwarfare, Geers explained. For one thing, modern military hardware tends to have computing power and networking capabilities. “When you think about it, any military ship, plane or tank has a slew of computers, processors, memory banks and network connections. There is a lot to attack and defend,” he said.

That could also include future nuclear missiles, which will have “some level of connectivity to the rest of the warfighting system,” as Werner J.A. Dahm, the chair of the Air Force Scientific Advisory Board told The Atlantic.

According to a March report in The New York Times, the United States has a program in place to target North Korea’s missile operations that could theoretically destroy the nation’s nuclear weapons before they are deployed.

While the details of such programs are rarely disclosed, IoT devices are likely commonly used for reconnaissance efforts to help opposing factions prepare the battlespace before combat. And during actual combat, parallel wars take place on computer networks. “I am not arguing that you can win a war with a cyberattack but you could win battles for sure if you infiltrate deeply into the network of your adversary,” Geers said.

Nevertheless, the fact that cyberwarfare has been a staple of modern cinema since at least the 1983 film WarGames leads many people to discount it as being unreal. “There are even people at Defcon don’t really understand cyberwar,” Geers noted. “Or they might think they understand it because they saw Die Hard 4 or something.”

While headline-grabbing cyber attacks like Stuxnet that target industrial control systems are rare, data suggests that cyberwarfare is a constant reality. “Every time there is an invasion or a coup d’état, you can see that reflected in malware communications,” Geers explained. “As the conflict in Ukraine was getting more intense, so was the malware communications inbound to both Ukraine and Russia.” 

The Internet of Things provides new opportunities for cyberespionage as well. As the number of networked IoT devices extends into the tens of billions of devices, it is inevitable that foreign powers will attempt to use some of those endpoints for data collection. After all, many come bundled with networked cameras and microphones that can all but do away with the need for traditional covert listening devices or hidden security cameras — or is at least blur the lines between them.

In any event, the role that the Internet of Things might play in future wars is difficult to assess, Geers explained. “Cybersecurity is really hard to predict because of the sheer number of attacks that are possible. I think the U.S. election last year is an example of that. I still don’t think we have figured out what happened there.” 

Tags: Article Security Technologies

Related


  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.
  • IoT Startup Raises $10M
    Platform aims to bolster network security with automated device configurations and visibility.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • IoT Device Security at the Edge Poses Unique Challenges
  • Zero-Trust Security for IoT: Establishing Rigorous Device Defenses
  • AI Ups the Ante for IoT Cybersecurity
  • Protecting Your Network Against Ripple20 Vulnerabilities

Roundups

View all

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

This white paper by @braincubeEn explores how the changes of 2020 and 2021 are shaping the future of #IIoT. Learn w… twitter.com/i/web/status/1…

27th May 2022
IoTWorldToday, IoTWorldSeries

UK Investing $50M for Self-Driving Buses, Vans dlvr.it/SR9QlJ https://t.co/sQdX2tJY4d

27th May 2022
IoTWorldToday, IoTWorldSeries

Dubai to Use Satellite IoT Terminals for Utilities Industry dlvr.it/SR9NQB https://t.co/GXf9Gx5RCw

27th May 2022
IoTWorldToday, IoTWorldSeries

@BerkshireGrey’s AI-powered next-gen warehouse robot is helping retailers by cutting times for order fulfillment, u… twitter.com/i/web/status/1…

27th May 2022
IoTWorldToday, IoTWorldSeries

Access the insights on IoT deployments, emerging tech and new applications now. Sign up to our dedicated… twitter.com/i/web/status/1…

27th May 2022
IoTWorldToday, IoTWorldSeries

Survey finds there's a lot of on-campus affinity for @StarshipRobots delivery #robots. dlvr.it/SR79YR https://t.co/73EaFPR6ft

26th May 2022
IoTWorldToday, IoTWorldSeries

That latest #IoT deals and partnerships news from @Google, @RedHat, @Arm, @SierraWireless, @ItronInc and more!… twitter.com/i/web/status/1…

26th May 2022
IoTWorldToday, IoTWorldSeries

@Ford is testing #geofencing tech that automatically cuts vehicle speeds. iotworldtoday.com/2022/05/26/for…

26th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X