IoT devices, if not set up securely, can be completely attacked by malicious code.
As of 2017, more than 7,000 IoT devices have been attacked by malware. Up to now, more than 6 billion smart devices are in use globally. And users are increasingly threatened by malicious code aimed at those connected devices.
Smart devices (such as watches, TVs, routers, cameras) – are connecting to form the Internet of Things (IoT) network. This is a network of devices equipped with embedded technology. This allows them to interact with each other or with external environments. Due to the large number of devices, IoT has become an attractive target for cybercriminals. By successfully infiltrating IoT devices, criminals can track users, blackmail them, and even discreetly make them their partners. Worse yet, bonets such as Mirai and Hajime showed an increase in cyber threats.
Kaspersky Lab experts have conducted research on IoT malware.
Experts check the danger level of malicious code. They have set up honeypots – artificial networks. This network simulates the network of various IoT devices (routers, connected cameras, etc.). This helps observe whether the malware tries to attack their virtual devices. As soon as the honeypot is established, the attack using malicious patterns immediately begins.
Most attacks target digital or IP cameras (63%). And then 20% attacks on network devices, including routers, DSL modems … About 1% of the target is the user’s most familiar devices such as printers and smart home devices. China (17%), Vietnam (15%), and Russia (8%) emerged as the top three countries with hacked IoT devices, each with a large number of infected machines. Brazil, Turkey and Taiwan – all followed at 7%.