sb-as logo
Story image

Malware targeting IoT devices skyrockets as transactions rise 1,500%

Zscaler today announced the release of the company’s second annual Internet of Things (IoT) report, which reveals a massive rise in the rate of usage of IoT devices and with it, an increase in cyber attacks against devices. 

According to the report, Zscaler customers are generating more than 1 billion IoT transactions per month in the Zscaler cloud.

This amounts to a 1,500% increase over the period between this and 2019’s report. 

By analysing two weeks of this traffic through Zscaler cloud, Zscaler found 553 different IoT devices across 21 categories from 212 manufacturers.

The company also found and blocked 14,000 IoT-based malware attempts per month.

Key Findings:

Unauthorised IoT devices on the rise:

The top unauthorised IoT devices Zscaler observed include digital home assistants, TV set-top boxes, IP cameras, smart home devices, smart TVs, smartwatches, and even automotive multimedia systems.

Manufacturing & retail industries top IoT traffic volume 

Manufacturing and retail customers generated the highest IoT traffic volume (56.8%) followed by enterprises (23.7%), entertainment and home automation (15.7%), and healthcare (3.8%). 

Majority of IoT transactions are insecure

83% of IoT-based transactions are occurring over plain-text channels, whereas only 17% are using secure (SSL) channels.

Exponential increase of IoT malware: 

Zscaler blocked 14,000 IoT-based malware attempts per month. That number has increased more than seven times than the May 2019 research.

New exploits emerging to target unauthorized devices: 

New exploits that target IoT devices are popping up all the time, such as the RIFT botnet, which looks for vulnerabilities in network cameras, IP cameras, DVRs, and home routers.

We have entered a new age of IoT device usage within the enterprise,” says Zscaler vice president of security research Deepen Desai. 

“Employees are exposing enterprises to a large swath of threats by using personal devices, accessing home devices, and monitoring personal entities through corporate networks,” says Desai.

“As an industry, we need to implement security strategies that safeguard enterprise networks by removing shadow IoT devices from the attack surface while continuously improving the detection and prevention of attacks that target these devices.”

Organisations around the world are observing this Shadow IoT phenomenon, in which employees are bringing unauthorised devices into the enterprise. 

With an unprecedented increase in unknown and unauthorised devices, IT and security teams often won’t know that these devices are on the corporate network nor how they impact an organisation’s overall security posture, the study finds.

As manufacturers bring more devices to market, the IoT threat landscape and its potential for breaches is expanding and changing.

The incredibly fast pace of IoT devices arriving to the market means organisations are scrambling to gain an understanding of what types of devices are communicating data, and how to secure the IoT ecosystem as a whole. 

From their inception, IoT devices were meant to be disposable, short-term investments due to low acquisition cost, inherent flaws, and the speed with which the device software becomes irrelevant/end-of-life, says Zscaler. 

There is no protocol for continuous testing, updating software, or patching, and yet these devices are all connected to the internet and to many corporate networks.

Over the quarter, Zscaler blocked approximately 42,000 transactions which were IoT-based malware and exploits. 

The top malware families included Mirai, Gafgyt, Rift, Bushido, Demonbot and Pesirai. 

The top destinations connected to by IoT malware families and exploits are the United States, the UK, Russia, The Netherlands and Malaysia.

Story image
CIOs put too much trust in TLS certificates - survey
Despite the prolific usage of TLS certificates within organisations, many CIOs aren't concerned about security risks associated with TLS machine identities.More
Story image
Business climate stabilising for tech companies following COVID crisis - report
The survey shows technology companies are continuing to see customer interest in cybersecurity, cloud computing and other areas.More
Story image
Surge in encrypted malware prompts warning about detection strategies
“If you are not decrypting and scanning your secure web connections, you are likely missing a large majority of malware,” the report states.More
Story image
Australians ignoring cybersecurity policies in favour of productivity
Trend Micro has found that 67% of remote workers have increased their cybersecurity awareness during COVID-19 related lockdowns. However, despite greater awareness people may still engage in risky behaviour, the survey finds.More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More
Story image
Cato adds SASE support accreditation, appoints channel exec
The company has announced its new global channel sales and business development vice president, as well as a new programme which accredits partners to deliver technical support services.More