The growth of connected devices is a double-edged sword. On the one hand, the Internet of Things (IoT) provides unparalleled efficiency in the home and office. However, the sector’s rapid expansion creates new opportunities for hackers. Concerningly, they continue to find ways to exploit device vulnerabilities, thereby turning them into weapons.
According to a
In fact, the report finds that approximately one million devices are now involved in botnet-driven attacks – a stark increase from the roughly 200,000 flagged last year. Let’s consider why less secure devices are attracting more hackers and how we can stop them.
The rise of IoT and cloud technologies is fuelling the expansion of botnets. These networks of compromised devices are controlled by a central command to collaboratively carry out cyber attacks. And more compromised devices result in rising DDoS traffic.
Between 500,000 and one million globally distributed, remotely controlled IoT hosts or cloud server instances are active daily, generating more than 40% of all DDoS traffic.
To make matters worse, legacy methods of identifying and preventing botnet attacks are not effective. Traditional identifiers like thresholds or baselines fail to work since botnets mimic real users from real devices. The key challenge lies in improving the accuracy of botnet detection while minimizing false positives to avoid disrupting legitimate traffic.
Further, there are geopolitical implications at play. DDoS attacks are evolving from mere disruptions to potent weapons in the hands of state actors. These attacks are increasingly weaponized as larger and more powerful botnets are coopted in geopolitical conflicts and cyber warfare.
In recent years, DDoS attacks have predominantly targeted government websites, communications service providers, and banks. Some of these attacks were brief, lasting less than five minutes, suggesting they were utilized as distractions to mask other malware and intrusion attempts.
This year, 90% of complex, multi-vector DDoS attacks were based on botnets. This trend should sound alarm bells for everyone invested in cybersecurity.
In this context, connected device vendors must prioritize security measures and safeguard their products and networks. By following these recommendations, vendors can minimize the risk of their devices being weaponized by hackers:
Strengthen Device-Level Security Controls: Connected device vendors must implement robust security measures at the device level. This includes stringent authentication protocols, secure firmware updates, and encryption of sensitive data. For example, a well-designed peer-to-peer (P2P) communication platform is one way to ensure that device communication is kept out of sight from bad actors, especially compared to traditional methods like port forwarding. By building security into their products from the ground up, vendors can prevent hackers from exploiting vulnerabilities.
Regular Vulnerability Assessments: Vendors no longer have an excuse – they must ramp up their vulnerability assessments and penetration testing to identify and address any weaknesses in their devices. This proactive approach helps to uncover potential vulnerabilities before they can be exploited.
Security Updates and Patches: Timely deployment of security updates and patches is crucial to protect connected devices in this landscape. Vendors should establish efficient mechanisms to deliver updates and notify customers to apply them. Likewise, it’s up to cybersecurity leaders in the home and office to take these updates and immediately patch their devices.
Continuous Monitoring and Network Traffic Analysis: Finally, vendors must implement robust monitoring systems to detect any unusual network activity or suspicious behavior. This allows for timely identification of potential threats and immediate remedial actions.
It’s worth considering that this threat could grow even further amidst the rollout of 5G. There’s a real risk that compromised devices operating with 5G’s increased bandwidth, and lower latency could produce even more powerful attacks. Therefore, connected device vendors need to nip this in the bud today and protect our online ecosystem tomorrow.
By implementing strong device-level security controls, conducting regular vulnerability assessments, ensuring quick security updates, and implementing effective monitoring systems, vendors can fortify their defenses against cyber threats. Meanwhile, users can enjoy the device revolution without aggravating this threat vector. Watch this space.