Attacks on connected objects explode in 2019
In his latest study, which covers the first half of 2019, Kaspersky reveals that attacks against connected objects have increased ninefold. Most often, it is because of an uncorrected vulnerability, or a word of error. simple past.
Pregnant, cars, watches, and now rings ... Connected objects are multiplying and they become at the same time targets for pirates. In its latest study, Kaspersky reveals that the attacks against so-called "IoT" devices were multiplied by 9 between the first half of 2018 and the first half of 2019, from 12 million attacks to ... 105 million!
Image by Gerd Altmann from Pixabay |
To perform these measurements, Kaspersky used "honeypot" that mimic connected objects to attract hackers, and its 50 "honeypots" have detected more than 100 million attacks, from 276,000 different IP addresses. All in just six months. Kaspersky calculated that his lures had generated 20,000 infected sessions every 15 minutes.
Common sense advice
Among the attacks, we find unsurprisingly the Mirai malware, responsible for 39% of attacks, by exploiting uncorrected vulnerabilities. For its part, the Nyadrop malware which also accounts for 39% of attacks is the specialist in brute force attacks. What the antivirus editor finds is simply that these are not very sophisticated attacks, which simply take advantage of simple flaws like a firmware not updated or a simple password.
Kaspersky thus recommends modifying, from the moment of purchase, the password proposed by default by the manufacturers, but also to update the devices when it is proposed since the files integrate the last patches in terms of security. Finally, it is always advisable to use a VPN to restrict the use and connections of objects to your local network (home or business).
No comments:
Post a Comment