Search
Close this search box.

IoT security threat from malware, botnets and weak passwords

IoT

IoT security is increasingly threatened by malware, botnets, weak passwords and poor encryption, a new report warns.

IoT security is being compromised by weak/cleartext passwords and weak encryption, the top access threats to critical infrastructure environments. This was followed by brute force and DDoS attempts. Trojans were the most common malware detected targeting enterprise IT networks, Remote Access Tools (RATs) topped the malware targeting OT, and DDoS malware targeted IoT devices, according to the report from Nozomi Networks Labs that finds wiper malware and IoT botnet activity significantly influenced the 2022 threat landscape.

Researchers saw hacktivists shift tactics from data theft and distributed denial of service (DDoS) attacks to utilising more destructive malware in an attempt to destabilise critical infrastructure to further their political stance in the Russia/Ukraine war.

“Over the past six months, cyberattacks have increased significantly, causing major disruption to industries ranging from transportation to healthcare,” said Roya Gordon, Nozomi Networks OT/IoT security research evangelist. “Railways, in particular, have been subject to attacks, leading to the implementation of measures designed to protect rail operators and their assets. As cyber threats evolve and intensify, it is important for organisations to understand how threat actors are targeting OT/IoT and the actions required to defend critical assets from threat actors.”

Malicious IoT botnet activity remained high and continued to rise in the second half of 2022. Nozomi Networks Labs uncovered growing security concerns as botnets continue to use default credentials in attempts to access IoT Devices.

From July to December 2022, Nozomi Networks honeypots found that attacks spiked in July, October and December with more than 5,000 unique attacks in each of those months. The top attacker IP addresses were associated with China, the United States, South Korea and Taiwan. “root” and “admin” credentials are still most often used as a way for threat actors to gain initial access and escalate privileges once in the network.

On the vulnerability front, manufacturing and energy remained the most vulnerable industries followed by water/wastewater, healthcare and transportation systems. In the last six months of 2022 CISA released 218 Common Vulnerabilities and Exposures (CVEs) – down 61 per cent from the first half of the year. 70 vendors were impacted, up 16 per cent from the previous reporting period; and affected products were also up six per cdent from the first half of 2022. 

Nozomi Networks’ “OT/IoT Security Report: A Deep Look into the ICS Threat Landscape” provides security professionals with the latest insights needed to re-evaluate risk models and security initiatives, along with actionable recommendations for securing critical infrastructure.

CTS The industrialisation of IT
CTS - Industrialisation of IT
Related Posts
CTS The industrialisation of IT
Others have also viewed

UK businesses see boosting connectivity as integral to growth

Study reveals a great opportunity for alternative network providers (AltNets) to meet growing demand for ...
centre

Germany Energy Efficiency Act demonstrates importance of data centre supply chain collaboration

Following the signing into law of Germany’s Energy Efficiency Act (EnEfG), energy solutions specialist Aggreko ...

Systemair look to Infor’s cloud solution to deliver more sustainable products

Systemair is moving its core business system to Infor CloudSuite Manufacturing, aiming at smoother integration ...
Data Centre

Vertiv collaborates with Intel on liquid cooled solution

Vertiv is collaborating with Intel to provide a liquid cooling solution that will support the ...