DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

Kaspersky Releases Overview Of IoT-related Threats In 2023

DigitalCIO Bureau by DigitalCIO Bureau
September 26, 2023
in News
0
Kaspersky Releases Overview Of IoT-related Threats In 2023
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Kaspersky has released a new report delving into the evolving threats targeting the Internet of Things (IoT) sector. The research uncovered a thriving underground economy on the dark web focused on IoT-related services, particularly for DDoS attacks.

With IoT devices, such as routers and smart home components, projected to exceed 29 billion by 2030, Kaspersky’s research offers critical insights into attack methods, dark web activities, and prevalent malware types.

Distributed Denial of Service (DDoS) attacks orchestrated through IoT botnets were found to be in high demand among hackers. In the first half of 2023, Kaspersky’s Digital Footprint Intelligence service analysts identified over 700 ads for DDoS attack services on various dark web forums.

The cost of these services varies depends on factors like DDoS protection, CAPTCHA, and JavaScript verification on the victim’s side, ranging from $20 per day to $10,000 per month. On average, the ads offered these services at $63.50 per day or $1,350 per month.

In addition, the dark web marketplace offers exploits for zero-day vulnerabilities in IoT devices, as well as IoT malware bundled with infrastructure and supporting utilities.

In the realm of IoT malware, a variety of families exist, with many originating from the 2016 Mirai malware. Fierce competition among cybercriminals has driven the development of features designed to thwart rival malware. These strategies include implementing firewall rules, disabling remote device management, and terminating processes linked to competing malware.

The primary method for infecting IoT devices continues to be through brute-forcing weak passwords, followed by exploiting vulnerabilities in network services. Brute-force attacks on devices are commonly directed at Telnet, a widely used unencrypted protocol. Hackers use this method to gain unauthorized access by cracking passwords, allowing them to execute arbitrary commands and malware. Although SSH, a more secure protocol, is also susceptible, it presents a greater resource challenge for attackers.

In the first half of 2023, Kaspersky’s honeypots recorded that 97.91% of password brute-force attempts focused on Telnet, with only 2.09% directed at SSH. These attacks were primarily focused on China, India, and the United States, while China, Pakistan, and Russia were the most active attackers.

Furthermore, IoT devices face vulnerabilities due to exploits in the services they use. These attacks often involve execution of malicious commands by exploiting vulnerabilities in IoT web interfaces, resulting in significant consequences, such as the spread of malware like Mirai.

“Kaspersky urges vendors to prioritize cybersecurity in both consumer and industrial IoT devices,” said Yaroslav Shmelev, a security expert at Kaspersky. “We believe that they must make changing default passwords on IoT devices mandatory and consistently release patches to fix vulnerabilities. In a nutshell, the IoT world is filled with cyber dangers, including DDoS attacks, ransomware, and security issues in both smart home and industrial devices. Kaspersky’s report stresses the need for a responsible approach to IoT security, obliging vendors to enhance product security from the get-go and proactively protect users.”

Types of IoT malware

IoT devices are susceptible to various types of malware, each serving distinct purposes:

1. DDoS Botnets: These malicious programs take control of IoT devices to launch Distributed Denial of Service (DDoS) attacks on a wide range of services.

2. Ransomware: Targeting IoT devices, particularly those containing user data like NAS boxes, ransomware encrypts files and demands ransoms for decryption.

3. Miners: Despite their limited processing power, some cybercriminals attempt to use IoT devices for cryptocurrency mining.

4. DNS Changers: Certain malware alters DNS settings on Wi-Fi routers, redirecting users to malicious websites.

5. Proxy Bots: Infected IoT devices are employed as proxy servers to reroute malicious traffic, making it difficult to trace and mitigate such attacks.

For more detailed information, please refer to Kaspersky’s full report on the IoT threat landscape for 2023 on Securelist.

To protect industrial and customer IoT devices, Kaspersky experts recommend:

    • Conduct regular security audits of OT systems to identify and eliminate possible vulnerabilities.
    • Use ICS network traffic monitoring, analysis and detection solutions for better protection from attacks potentially threatening technological process and main enterprise assets.
    • Make sure you protect industrial endpoints as well as corporate ones. Kaspersky Industrial CyberSecurity solution includes dedicated protection for endpoints and network monitoring to reveal any suspicious and potentially malicious activity in industrial network.
Tags: DDoSDistributed Denial of ServiceInternet of ThingsIoTKasperskyThreats
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Okta Names Mathew Graham as Chief Security Officer for Asia Pacific

by DigitalCIO Bureau
September 2, 2025
0
Okta Names Mathew Graham as Chief Security Officer for Asia Pacific

Okta has appointed experienced security executive Mathew Graham as its Chief Security Officer (CSO) for the Asia-Pacific region. Graham will be responsible for driving Okta’s regional security strategy,...

Read moreDetails

Okta Acquires Axiom Security

by DigitalCIO Bureau
August 27, 2025
0
CRISIL To Acquire Bridge To India Energy

Okta has signed a definitive agreement to acquire Axiom Security, a modern, identity-centric Privileged Access Management (PAM) solution built for cloud, SaaS, and database environments. Axiom’s technology will...

Read moreDetails

SonicWall Appoints Michael Crean As General Manager of Its Managed Security Services Division

by DigitalCIO Bureau
August 27, 2025
0
SonicWall Appoints Michael Crean As General Manager of Its Managed Security Services Division

SonicWall today announced another step in its transformation to become the cybersecurity platform purpose-built for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs) and the customers they...

Read moreDetails

C5i And Databricks Launch Marketing Data Cloud

by DigitalCIO Bureau
August 19, 2025
0
More Than 50% of CDAOs Will Secure Funding for Data Literacy and AI Literacy Programs by 2027

C5i, a pure-play AI and analytics company, has announced the expansion of its partnership with Databricks with the launch of its Marketing Data Cloud (MDC), a validated Built...

Read moreDetails

Palo Alto Networks Acquires CyberArk For $25 Billion

by DigitalCIO Bureau
July 31, 2025
0
Check Point Acquires SASE Security Firm Perimeter 81

Palo Alto Networks and CyberArk have announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the...

Read moreDetails
Next Post
Majority Organizations View Ransomware as a Top-three Threat to the Viability of the Business

Majority Organizations View Ransomware as a Top-three Threat to the Viability of the Business

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Windows’ latest zero-day vulnerability could allow hackers to overwrite ‘pci.sys’ file

December 31, 2018

Unacademy database of 22 million users hacked, up for sale

May 8, 2020

Infosys Partners with Google Cloud

September 27, 2018

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?