Internet of Things · 2019-10-16

Kaspersky “honeypots” register over 100 mln attacks on smart devices in H1 2019 -IoT


This article was 1st published on our sister Site, The Internet Of All Things.

Woburn, MA, Oct. 15, 2019:  Kaspersky “honeypots” have detected 105 million attacks on the Internet of Things (IoT) devices coming from 276,000 unique IP addresses in the first six months of 2019.

According to a release out out by Kaspersky, this was nearly nine times more than the number found in H1 2018, when about 12 million attacks were spotted, originating from 69,000 IP addresses. The findings come from Kaspersky’s “IoT: A Malware Story” report on honeypot activity in H1 2019.

To learn more about how such attacks work and how to prevent them, Kaspersky researchers set up honeypots, which are decoy devices used to attract the attention of cybercriminals and analyse their activities.

According to the analysis of honeypot data, attacks on IoT devices were generally not sophisticated, but were stealthy, leaving users unaware that their devices were being exploited, said Kaspersky.

Mirai, the malware family behind 39 per cent of the attacks, was capable of using exploits, meaning that these botnets could slip through old, unpatched vulnerabilities to the device and control it. Another technique was password brute-forcing, which was the method used by the second most widespread malware family in the list – Nyadrop. The latter was seen in 38.57 per cent of attacks and often serves as a Mirai downloader. The third most common botnet threatening smart devices, Gafgyt, was used in 2.12 per cent of attacks and also used brute-forcing.

For the rest, click here.


Click here to opt-out of Google Analytics