By Roger Mitan
Many DDoS attacks like this occur every day, but this one stood out because of the large base of companies impacted and the type of devices used for this attack. The devices that were mostly responsible are in a category known as the Internet of Things (IoT). What are IoT devices and why should you be concerned about them?
IoT devices are, simply put, everyday devices that can now be addressed directly via a network. These are devices like thermostats, various types of sensors, refrigerators, cars, security cameras, and many more. These devices have all existed for a long time and some of them have even been indirectly accessible via the internet for some time, usually through a connected workstation or server. What has occurred more recently is the proliferation of tiny, low-power and inexpensive System on Module (SOM) and Computer on Module (COM) systems which have been integrated into these everyday devices, allowing them to now serve up their functions and data directly to the network and internet. No longer is a workstation or server needed to be in-between these devices and the network.
The applications of these types of devices are vast and very useful for everyday tasks, such as home automation, remote car automation, security systems monitoring, sensor monitoring, etc. Removing the need for a computer interface to connect them to the internet increases their efficiency while decreasing their cost and complexity. Unfortunately, this also reduces the security of these devices.
Some of what was learned from the Dyn attack was that about 100,000 of these IoT devices were hijacked due, in a small part, to unpatched vulnerabilities, but more often due to default admin credentials existing on these devices. Many of these devices didn’t even offer the end user a way to change these default credentials. Hackers were then easily able to login to these devices and use them to direct attacks at this critical DNS infrastructure.
Most people today know that they shouldn’t connect their computer to the internet without good firewall and antivirus software, and in most cases, they are also behind additional hardware firewalls. These IoT devices, though, are being purchased and put directly on the internet with no security other than what is built in to them, which is usually next to nothing.
From the end user standpoint, this opens a vulnerability into your network from the internet when an attacker compromises one of these devices exposed at your network edge and then uses it as a doorway into your important internal systems. From an external standpoint, if one of your devices is compromised and used for one of these DDoS attacks you will most likely find your internet grind to a halt and may even have your internet provider cut you off to help mitigate the attack. Therefore, from many angles, improperly secured IoT devices pose a serious security threat.
There are several options to help protect yourself from these device vulnerabilities. First, keep in mind these devices are extremely useful and you can’t simply avoid them. You can, however, ensure you perform proper research and ensure you are buying reputable products. That $20 IP camera may look like a great deal, but it might also be a great resource on your network for a hacker to exploit.
Second, employ a good perimeter firewall which includes advanced threat protection that will detect and stop not only external attacks, but also attacks and exploits being perpetrated from within your network. Make sure these devices are always placed behind these firewalls and not directly on the internet.
The third suggestion is to go a level beyond the firewall and utilize the services of a Managed Security Services Provider (MSSP). This is a team of people who will supplement the automated protection of your firewall with skilled people trained in detecting these types of threats and identifying these rogue or unsafe and unsecure devices on your network before they become an issue for you or others on the internet.
The number and types of IoT devices is expanding every day and making lives easier along with that expansion. Many of these devices are also in their infancy from a security perspective. Take advantage of these devices, but also take some precautions to ensure they are working for you and not for hackers out there who love them for very different reasons.
Roger Mitan is the director of engineering with BlueBridge Networks, a downtown Cleveland-headquartered data-center and cloud computing business. He can be reached at (216) 621-2583 and email@example.com.
WordPress database error: [You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ')
ORDER BY menu_order ASC' at line 3]
SELECT ID FROM wp_posts
WHERE post_type = 'attachment'
AND ID in ()
ORDER BY menu_order ASC