Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/21/2016
10:00 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

7 Imminent IoT Threats

Attacks against smart home products, medical devices, SCADA systems, and other newly network-enabled systems signal the beginning of a new wave of attacks against the IoT.
Previous
1 of 8
Next

Image Source: chombosan via Shutterstock

Image Source: chombosan via Shutterstock

Recent distributed denial-of-service (DDoS) attacks involving the use of thousands of compromised digital video recorders and IP cameras have highlighted the looming security threat posed by the Internet of Things (IoT).

Analyst firm Juniper Research estimates that between now and the end of 2020, the number of "things" connected to the Internet will grow from 13.5 billion to 38.5 billion units, an increase of over 285%.

Home appliances such as smart fridges, TVs, entertainment systems, security cameras, and smart heating and lighting systems will account for a lot of the growth. But a majority of it will come from the industrial and public sector in the form of network-enabled devices embedded in smart buildings, farm equipment, the utility grid, and other areas, according to Jupiter.

Security researchers worry that as more things get connected to the Internet, adversaries will have an almost infinitely larger surface from which to launch new types of attacks.

That’s because devices that are becoming part of the IoT have few security protections against network-borne threats and are often easy to exploit. For the moment at least, there are no standards prescribing security requirements for IoT devices, especially in the consumer space.

"Internet-connected devices are being churned out of factories and infected by malware or malicious code at an alarming rate,” says Jose Nazario, director of security research at content distribution network, Fastly.

IoT devices offer bandwidth and CPU resources at virtually no cost to the attacker. Over the next few years, "as non-secure IoT devices amass, cybercriminals will have much greater resources available to launch new attacks more rapidly and at larger scale," he predicts.

In the past few years, researchers have demonstrated various proof-of-concept attacks against everything from network-connected baby monitors to connected cars. The demonstrations have shown how attackers can exploit poorly protected IoT devices to cause physical damage, to spy on people, and to launch massive denial of service attacks.

The following is a list of IoT devices in no particular order that have either already been exploited by attackers, have been demonstrated to be vulnerable, or are the most likely candidates for future attacks.

 

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13453
PUBLISHED: 2019-07-17
Zipios before 0.1.7 does not properly handle certain malformed zip archives and can go into an infinite loop, causing a denial of service. This is related to zipheadio.h:readUint32() and zipfile.cpp:Zipfile::Zipfile().
CVE-2019-4211
PUBLISHED: 2019-07-17
IBM QRadar SIEM 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159131.
CVE-2019-4430
PUBLISHED: 2019-07-17
IBM Maximo Asset Management 7.6 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162887.
CVE-2018-1921
PUBLISHED: 2019-07-17
IBM Campaign 9.1.0, 9.1.2, 10.1, and 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152857.
CVE-2018-2021
PUBLISHED: 2019-07-17
IBM QRadar SIEM 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 155345.