paint-brush
Hackers are Weaponizing Connected Devices, Here’s How We Stop Themby@nabto
209 reads

Hackers are Weaponizing Connected Devices, Here’s How We Stop Them

by Carsten Rhod GregersenJune 29th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The growth of connected devices is a double-edged sword. Consumers enjoy new conveniences, but the sector’s rapid expansion creates new opportunities for hackers. One million devices are now involved in botnet-driven attacks – a stark increase from the roughly 200,000 flagged last year. This article suggests strengthening device security controls, conducting regular vulnerability assessments, and patching security updates to stop hackers in their tracks.
featured image - Hackers are Weaponizing Connected Devices, Here’s How We Stop Them
Carsten Rhod Gregersen HackerNoon profile picture

The growth of connected devices is a double-edged sword. On the one hand, the Internet of Things (IoT) provides unparalleled efficiency in the home and office. However, the sector’s rapid expansion creates new opportunities for hackers. Concerningly, they continue to find ways to exploit device vulnerabilities, thereby turning them into weapons.


According to a report this month from Nokia, the industry is experiencing a five-fold increase in distributed denial-of-service (DDoS) attacks. And profit-driven hacking collectives and growing consumer gadgets are to blame.


In fact, the report finds that approximately one million devices are now involved in botnet-driven attacks – a stark increase from the roughly 200,000 flagged last year. Let’s consider why less secure devices are attracting more hackers and how we can stop them.


The Growing Threat of Botnets


The rise of IoT and cloud technologies is fuelling the expansion of botnets. These networks of compromised devices are controlled by a central command to collaboratively carry out cyber attacks. And more compromised devices result in rising DDoS traffic.


Between 500,000 and one million globally distributed, remotely controlled IoT hosts or cloud server instances are active daily, generating more than 40% of all DDoS traffic.


To make matters worse, legacy methods of identifying and preventing botnet attacks are not effective. Traditional identifiers like thresholds or baselines fail to work since botnets mimic real users from real devices. The key challenge lies in improving the accuracy of botnet detection while minimizing false positives to avoid disrupting legitimate traffic.


The Weaponization of Devices


Further, there are geopolitical implications at play. DDoS attacks are evolving from mere disruptions to potent weapons in the hands of state actors. These attacks are increasingly weaponized as larger and more powerful botnets are coopted in geopolitical conflicts and cyber warfare.


In recent years, DDoS attacks have predominantly targeted government websites, communications service providers, and banks. Some of these attacks were brief, lasting less than five minutes, suggesting they were utilized as distractions to mask other malware and intrusion attempts.


This year, 90% of complex, multi-vector DDoS attacks were based on botnets. This trend should sound alarm bells for everyone invested in cybersecurity.


How Device Vendors Can Ramp Up Their Cybersecurity


In this context, connected device vendors must prioritize security measures and safeguard their products and networks. By following these recommendations, vendors can minimize the risk of their devices being weaponized by hackers:


  • Strengthen Device-Level Security Controls: Connected device vendors must implement robust security measures at the device level. This includes stringent authentication protocols, secure firmware updates, and encryption of sensitive data. For example, a well-designed peer-to-peer (P2P) communication platform is one way to ensure that device communication is kept out of sight from bad actors, especially compared to traditional methods like port forwarding. By building security into their products from the ground up, vendors can prevent hackers from exploiting vulnerabilities.


  • Regular Vulnerability Assessments: Vendors no longer have an excuse – they must ramp up their vulnerability assessments and penetration testing to identify and address any weaknesses in their devices. This proactive approach helps to uncover potential vulnerabilities before they can be exploited.


  • Security Updates and Patches: Timely deployment of security updates and patches is crucial to protect connected devices in this landscape. Vendors should establish efficient mechanisms to deliver updates and notify customers to apply them. Likewise, it’s up to cybersecurity leaders in the home and office to take these updates and immediately patch their devices.


  • Continuous Monitoring and Network Traffic Analysis: Finally, vendors must implement robust monitoring systems to detect any unusual network activity or suspicious behavior. This allows for timely identification of potential threats and immediate remedial actions.


Creating A Safer Digital Ecosystem


It’s worth considering that this threat could grow even further amidst the rollout of 5G. There’s a real risk that compromised devices operating with 5G’s increased bandwidth, and lower latency could produce even more powerful attacks. Therefore, connected device vendors need to nip this in the bud today and protect our online ecosystem tomorrow.


By implementing strong device-level security controls, conducting regular vulnerability assessments, ensuring quick security updates, and implementing effective monitoring systems, vendors can fortify their defenses against cyber threats. Meanwhile, users can enjoy the device revolution without aggravating this threat vector. Watch this space.