The Asian Age

INSECURE DEVICES ALLOW HACKERS INTO YOUR HOME

- AGE CORRESPOND­ENT

Devices like home networks, routers, modems, CCTV systems and industrial control systems are very vulnerable

New study reveals how Internet of Things ( IoT) devices at home, office can be manipulate­d; its vulnerabil­ity can open a backdoor to hackers. Symantec Corp., a known expert in cyber security, has revealed new research demonstrat­ing how cybercrimi­nal networks are taking advantage of lax IoT device security to spread malware and create zombie networks, or botnets, unbeknown to their device owners.

Symantec's Security Response team has discovered that cy bercrimina­ls are hi jacking home networks and everyday, consumer connected devices to help carry out distribute­d denial of service ( DDoS) attacks on more profitable targets, usually large companies. To succeed, they need cheap bandwidth and get it by stitching together a large web of consumer devices that are easy to infect because they lack sophistica­ted security.

More than half of all IoT attacks originate from China and the US, based on the location of IP addresses, to launch malware attacks. High numbers of attacks are also emanating from Germany, the Netherland­s, Russia, Ukraine and Vietnam. In some cases, IP addresses may be proxies used by attackers to hide their true location.

Most IoT malware targets non-PC embedded devices such as web servers, routers, modems, network attached storage ( NAS) devices, closed- circuit television ( CCTV) systems, and industrial control systems. Many are Internet- accessible but, because of their operating system and processing power limitation­s, they may not include any advanced security features.

As attackers are now highly aware of insufficie­nt IoT security, many pre- program their malware with commonly used and default passwords, allowing them to easily hijack IoT devices. Poor security on many IoT devices makes them easy targets, and often victims may not even know they have been infected. Symantec's research findings - 2015 was a record year for IoT attacks, with plenty of speculatio­n about possible hijacking of home automation and home security devices. However, attacks to date have shown that attackers tend to be less interested in the victim and the majority wish to hijack a device to add it to a botnet, most of which are used to perform DDoS attacks.

- IoT devices are a prime target, since they are designed to be plugged in and forgotten after basic set- up.

- The most common passwords IoT malware used to attempt to log into devices was, unsurprisi­ngly, the combinatio­n of ' root' and ' admin', indicating that default passwords are frequently never changed.

- Attacks originatin­g from multiple IoT platforms simultaneo­usly may be seen more often in the future, as the amount of the embedded devices connected to the Internet rises.

 ??  ??

Newspapers in English

Newspapers from India