Ethical Hacking

ADVANCED TECHNOLOGY

Header Ads

LightBlog

Breaking

Friday, 20 April 2018

LONG-AWAITED CRISIS IS HERE AND MANY DEVICES AREN'T READY


LONG-AWAITED CRISIS IS HERE AND MANY DEVICES AREN'T READY

YOU KNOW that Internet of Things devices like your router are often vulnerable to attack, the industry-wide lack of investment in security leaving the door open to a host of abuses. Even decades, content and web services firm findings that it has observed attackers actively exploiting a flaw in devices like routers and video game consoles that was originally exposed in 2006.
Attackers are actively exploiting these weaknesses not to attack the devices themselves, but as a jumping off point for all sorts of malicious behavior, which could include DDoS attacks, malware distribution, spamming/phishing/account takeovers, click fraud, and credit card theft. This creates elaborate "proxy" chains that cover an attacker's tracks, and create what Akamai calls "multi-purpose proxy botnets."

Down With UPnP

UPnP helps devices on a network find and essentially introduce themselves to each other, so that a server, say, can discover and vet the printers on a network. You can find it both on internal, institutional networks and on the larger internet, handling things like IP address routing and data flow coordination. UPnP works with and incorporates other network protocols to negotiate and automatically configure these network communications, and it can be used when applications want to send each other large quantities of data to facilitate a sort of unrestricted fire hose—think video streaming, or a gaming console talking to its web server.

Uptick in Attacks

UPnP attacks haven't been around. Last month, for example, Symantec published evidence that an espionage group it tracks known as Inception Framework uses UPnP proxying to compromise routers and obscure its cloud communications. But observers note that the strategy is probably not more common because the schemes are difficult to set up.
The whole point of proxying is to cover your tracks, so a lot is still unknown about how attackers use UPnP proxying and for what. But Akamai's goal is to raise awareness about the problem to ultimately reduce the number of vulnerable devices that exist.


Internet of Threats

·         Internet of Things security is still not enough of a priority-A big part of the problem is that every device is a black box, we don't know what code these things are running and it's all proprietary (aka unvetted) -This means that even when the tech industry develops and agrees on a standards and protocols, IoT manufacturers that aren't focusing on security can still implement them in problematic ways, leading to vulnerabilities.



·         Online banking accounts and other services involving sensitive content are obvious criminal targets and are vulnerable to spyware, phishing, malware scams and identity theft.
·         Connected, 'smart cities' are one of the hoped-for benefits of the IoT, but they will also inevitably mean cybercriminals and cyberterrorists trying to gain control of city services like lighting, traffic control and emergency systems.






No comments:

Post a Comment