Insecure Home IoT Devices a Clear and Present Danger to Corporate Security

  /     /     /  
Publicated : 23/11/2024   Category : security


Insecure Home IoT Devices a Clear and Present Danger to Corporate Security


Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.



Nearly three years after the Mirai distributed denial-of-service (DDoS) attacks, the danger to corporate networks from insecure consumer Internet of Things (IoT) devices appears to have grown.
Researchers from Avast Software, in collaboration with researchers from University of Illinois Urbana-Champaign and Stanford University, recently analyzed data from 83 million Internet-connected devices in some 16 million homes globally to better understand how they are deployed, as well as how secure they are. Devices scanned included home routers, game consoles, printers, scanners, home IP cameras, and home automation devices, such as smart thermostats. Computers and phones were excluded from the IoT classification in the study.
The research highlights not only the prevalence of IoT devices, but also their inherent vulnerabilities, says Rajarshi Gupta, vice president and head of AI at Avast. 
According to the study, one-third of the homes has at least one IoT device. In North America, the number is double, at 66%. The research shows that one in four homes in North America have three or more IoT devices, and 9% have six or more.
Media devices, such as smart TVs and streaming devices, are by far the most common IoT devices in a majority of geographies. However, beyond that, the types of IoT devices installed in home networks tend to vary widely by region.
For example, Internet-connected home surveillance equipment is the most common IoT device across several parts of Asia; work appliances, like printers, are more prevalent in Africa; and voice and home assistant devices, such as those from Amazon and Google, are substantially more common in North America than anywhere else.
Security Concerns
Disturbingly, millions of the devices in the Avast
study
have security weaknesses, such as open services, weak default credentials, and vulnerabilities to known attacks. Millions of devices, for instance, are still using obsolete protocols, such as FTP and Telnet, Gupta says. In some parts of Africa, the Middle East, and Southeast Asia, as many as 50% of IoT devices still support FTP, and nearly 40% of home routers in Central Asia use Telnet.
Open and weak HTTP credentials are another major concern with a significant proportion of routers that Avast and the other researchers analyzed. A small number of home routers in the study host publicly accessible services. But more than half (51.2%) that did also had a recently exploited vulnerability on them.
Millions of IoT devices today still use obsolete protocols like Telnet and FTP, both of which are known to transfer data in plain text, Gupta notes. The security implications of this cannot be overstated, and Id argue that there is absolutely no reason to be using these protocols in 2019.
The Mirai malware of 2016, for instance, exploited such weaknesses in IoT products to enable attackers to quickly assemble botnets for launching DDoS attacks. There are other concerns, too. Many IoT products that people use at home are found in work environments as well, especially printers, cameras and TVs, Gupta says.
If a gadget at home is compromised and that employee unknowingly uses their work laptop on the same Wi-Fi, a cyberattacker can infiltrate the computer, too, he says.
The Avast-sponsored study shows that despite a large number of branded IoT products around the world, the number of manufacturers is surprisingly small.
Theres a long tail of more than 14,000 IoT manufacturers globally, he says. Yet an overwhelming majority of all devices — 94% — are made by the same 100. Half are made by the same 10.
This market dominance means the onus for building strong privacy and security postures for IoT products rests with a handful of companies.
Device manufacturers — at the very least, the top 100 — need to incorporate stronger security principles into their software development process, Gupta says. Consumers, meanwhile, should consider security controls that can observe traffic at the router-level, identify irregular device behavior, and quarantine malicious network flows or infected devices.
Related Content:
Insecure IoT Devices Pose Physical Threat to General Public
Peer-to-Peer Vulnerability Exposes Millions of IoT Devices
New IoT Security Bill: Third Times the Charm?
7 Malware Families Ready to Ruin Your IoTs Day
 

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Insecure Home IoT Devices a Clear and Present Danger to Corporate Security