Kaspersky
has released a new
report delving into the evolving threats targeting the Internet of Things
(IoT) sector. The research uncovered a thriving underground economy on the dark
web focused on IoT-related services, particularly for DDoS attacks.
With
IoT devices, such as routers and smart home components, projected
to exceed 29 billion by 2030, Kaspersky's
research offers critical insights into attack methods, dark web activities, and
prevalent malware types.
Distributed
Denial of Service (DDoS) attacks orchestrated through IoT botnets were found to
be in high demand among hackers. In the first half of 2023, Kaspersky's Digital
Footprint Intelligence service analysts identified over 700 ads for DDoS attack
services on various dark web forums.
The
cost of these services varies depends on factors like DDoS protection, CAPTCHA,
and JavaScript verification on the victim's side, ranging from $20 per day to
$10,000 per month. On average, the ads offered these services at $63.50 per day
or $1,350 per month.
In
addition, the dark web marketplace offers exploits for zero-day vulnerabilities
in IoT devices, as well as IoT malware bundled with infrastructure and
supporting utilities.
In the
realm of IoT malware, a variety of families exist, with many originating from
the 2016 Mirai malware. Fierce competition among cybercriminals has driven the
development of features designed to thwart rival malware. These strategies
include implementing firewall rules, disabling remote device management, and
terminating processes linked to competing malware.
The
primary method for infecting IoT devices continues to be through brute-forcing
weak passwords, followed by exploiting vulnerabilities in network services.
Brute-force attacks on devices are commonly directed at Telnet, a widely used
unencrypted protocol. Hackers use this method to gain unauthorized access by
cracking passwords, allowing them to execute arbitrary commands and malware.
Although SSH, a more secure protocol, is also susceptible, it presents a
greater resource challenge for attackers.
In the
first half of 2023, Kaspersky's honeypots recorded that 97.91% of password
brute-force attempts focused on Telnet, with only 2.09% directed at SSH. These
attacks were primarily focused on China, India, and the United States, while
China, Pakistan, and Russia were the most active attackers.
Furthermore,
IoT devices face vulnerabilities due to exploits in the services they use.
These attacks often involve execution of malicious commands by
exploiting vulnerabilities in IoT web interfaces,
resulting in significant consequences, such as the spread of malware like
Mirai.
"Kaspersky urges
vendors to prioritize cybersecurity in both consumer and industrial IoT
devices," said Yaroslav Shmelev, a security expert at
Kaspersky. "We believe that they must make changing default passwords on
IoT devices mandatory and consistently release patches to fix vulnerabilities.
In a nutshell, the IoT world is filled with cyber dangers, including DDoS
attacks, ransomware, and security issues in both smart home and industrial
devices. Kaspersky's report stresses the need for a responsible approach to IoT
security, obliging vendors to enhance product security from the get-go and
proactively protect users."
Types
of IoT malware
IoT
devices are susceptible to various types of malware, each serving distinct
purposes:
1.
DDoS Botnets: These malicious programs
take control of IoT devices to launch Distributed Denial of Service (DDoS)
attacks on a wide range of services.
2.
Ransomware: Targeting IoT devices,
particularly those containing user data like NAS boxes, ransomware encrypts
files and demands ransoms for decryption.
3.
Miners: Despite their limited processing
power, some cybercriminals attempt to use IoT devices for cryptocurrency
mining.
4.
DNS Changers: Certain malware alters DNS
settings on Wi-Fi routers, redirecting users to malicious websites.
5.
Proxy Bots: Infected IoT devices are
employed as proxy servers to reroute malicious traffic, making it difficult to
trace and mitigate such attacks.
For more detailed information,
please refer to Kaspersky's full report on the IoT threat
landscape for 2023 on Securelist.