What malicious code is designed to spread through IoT devices?
Attacks from IoT devices are one of the new forms of network attacks with a very large scale. So do you know which malicious code is designed to spread through IoT devices? Follow this article to better understand as well as know some solutions when encountering this problem.
Question : What malicious code is designed to spread through IoT devices?
Answer : Mirai is a malicious code designed to spread through IoT devices. Easily infect devices such as: Security cameras, Routers, printers,. And it can attack the computer 's denial of service .
IoT is being used a lot in the market today, but it is threatened by malicious code, invasive as well as affecting devices. Follow along with the article below to learn more about IoT as well as the types of malicious code that compromise it!
1. What is IoT?
IoT (Internet of Things) is a collection of devices that are able to connect with each other, with the Internet and with the outside world to do a certain job. It is a system of interrelated computing devices, mechanical and digital machines or humans and the ability to transmit data over a network without requiring human-computer interaction.
2. What types of malware are designed to spread through IoT devices?
One of the types of malicious code designed to spread through IoT devices that attracts the attention of the public today is the Mirai variant . This type of malicious code attack has caused many losses to users, especially it can steal personal information as well as important data of users. The most intense attack was in 2017, about 15 million computers were infected with viruses caused by Mirai.
3. Why is USB the main cause of malicious code spreading through IoT devices?
In 2017, about 15 million computers were infected with viruses caused by Mirai, experts analyze the cause of malicious code spreading through IoT devices is due to USB . Although USB is a popular means of backing up and exchanging data between computers, the sense of safe use of USB has not been improved much.
How to fix
To limit the spread of viruses through USB, you should download Virus scanning software so that you can scan USB before using or on strange devices. Enterprises should strengthen the solution to control the synchronous security policy to minimize the penetration of malicious code.
4. Type of attack targeting IoT Smarthome
Man-in-the-middle
An attacker disrupts or tamperes with communication between two systems.
Example : Fake temperature data is generated by environmental monitoring devices, creating a spoofing effect and forwarding to the cloud.
Data and identity theft
Data generated by unprotected smart devices will have personal information stolen for transactions for fraud and identity theft.
Device hijacking
An attacker can take control and control the device in a powerful way. These types of attacks are often difficult to detect because their functions do not change too much. As well as very simple operation, only one device is capable of re-infecting other devices in the house.
Distributed Denial of Service (DDoS)
This means that an attacker will find a way to temporarily or indefinitely disrupt the services of an Internet-connected server. The high-traffic, distributed service attack case makes it difficult to prevent cyberattacks by blocking only a single source.
Example : When a sensor is compromised on a network it can infect similar devices running the same software. These infected devices often have to run into the vast army of Botnets to carry out attacks.
Perpetual Denial of Service (PDoS)
This is an attack that damages devices to the point of requiring hardware replacement or reinstallation.
Example : BrickerBot is encrypted to exploit hard-coded passwords in IoT devices and cause a permanent denial of service.
5. How to protect IoT devices from malware
Choose a reliable IoT product
This is the most important thing when using IoT. An IoT device from a reputable supplier will have very strong and safe security equipment. Therefore, in the process of using malicious code is also more limited. Even hackers who want to break into IoT cannot.
Use strong authentication credentials
Most IoT devices will come with factory default passwords. Taking advantage of that opportunity, the hackers broke into the devices with the same default password. Therefore, users need to change the password so that it has high security to keep it out of the eyes of hackers.
Keep IoT devices up to date
New versions come out with the completion of the old version's vulnerabilities. Therefore, it is recommended to update IoT devices regularly to enhance security and safety. All operating systems, management programs, driver programs, etc. need to be updated to the latest version.
6. Signs that IoT devices have been infected with malicious code
Computer/laptop
This is a tool that hackers use to accomplish their goals.
- Sign
+ Unusually slow network access, strange toolbar appears.
+ Your account's password is suddenly changed, or you receive fake emails or messages from your account.
+ The computer automatically installs strange software, the mouse pointer runs around and stops at the target specified by the hacker.
+ Anti-virus program, Task Manager, Registry Editor are disabled.
- How to fix
Use anti-virus software.
+ Should use genuine software, limit the use of crack tools.
+ Update new versions regularly.
Mobile phone
This is the second device after the computer that hackers keep an eye on.
- Sign
+ Heavy loss of battery. If the battery drains unexpectedly quickly, the phone may be infected with malicious code.
+ Phone works slow due to virus attack.
+ The phone is off for a long time, the call is often blocked.
- How to fix
+ Need to install anti-virus software for the phone.
+ Be careful when downloading applications, should download high-quality applications.
+ Update new versions regularly.
Other IoT Devices
- Smart home
Having hijacked Smartphone, hackers use Smartphone to unlock the house and proceed to infiltrate.
- Smart car
A car with an Internet connection can easily and completely control this car after being infiltrated. Hackers can adjust the air conditioning system, radio, can automatically turn off the engine when the car is running, and can even disable the car's brake pedal.
- Smart locks
Can be hijacked via Smartphone, hackers can unlock via Wifi, Bluetooth, .
- Cameras, smart power sockets, TVs with WiFi, bicycles with Bluetooth : these devices are also easily hacked by hackers if there is no security.
This article has helped you understand what IoT is? And what malicious code spreads through IoT. Hope this article will help you. See you in the next post!
You should read it
- 10 typical malware types
- What is Safe Malware? Why is it so dangerous?
- Can a VPN Fight Malware?
- What is Malware? What kind of attack is Malware?
- The 4 most common ways to spread malware today
- Learn about polymorphic malware and super polymorphism
- What is Goldoson Malware? How can you protect yourself?
- What is rooting malware? What can you do to protect yourself?
May be interested
- Warning: Detecting a campaign to spread malicious code GandCrab 5.2 into Vietnam via fake email of the Ministry of Public Securityvietnam computer emergency response center (vncert) has sent a dispatch to member units informing that there is a campaign to distribute malicious code to extort gandcrab 5.2 into vietnam and southeast asian countries. .
- Google Alert is being used to spread malicious codeby using fake data leak notifications, hackers have taken advantage of google alert itself to spread malware and other phishing campaigns.
- Warning of new malware appear like Wannacry, capable of deleting Vietnamese percussion on computera new type of malicious code appeared, taking advantage of vulnerabilities in the windows operating system (the ms17-010 vulnerability was announced in march 2017) to spread widely in the local area network (lan) (similar to how it spreads). like the legendary wannacry virus) is spreading in vietnam.
- Virus turns iPhone into 'ghost phone'after two weeks of infection on several hundred phones in australia only, malicious code written specifically for apple smartphones spread to devices operating in many other networks ...
- GIBON extortion code spread through spama new ransomware called gibon, once again malspam (malware spread via email) attaches a malicious file and contains the download macro, installs the malicious code to blackmail the victim's computer.
- 14 games on the App Store contain malicious code, iPhone users be carefulsecurity researchers wandera recently discovered 14 games linked to a server once used to control malware golduck that made the android world chaotic last year.
- Warning: new code of virtual money digging is available via Facebook Messengersecurity researchers from trend micro have discovered a new virtual money code that is attacking users via facebook messenger called facexworm.
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to preventthe 'blackmail' malicious code called petya, which appeared under the new version of petrraprap, is similar in effect to the wannacry malicious code, causing the computer system of many multinational companies to be shattered. according to the initial record, these first countries infected with malicious code include ukraine, russia, britain and india.
- Hackers break into chats on Microsoft Teams to spread malwareinternational security researchers have just warned about a relatively new form of attack related to the traditional enterprise application platform microsoft teams.
- Warning: VPNFilter malicious code attacks the router that has 'evolved', there are many extremely dangerous new featuresnewly discovered experts, vpnfilter has attacked and infected more than 500,000 routers recently added the ability to remove https encryption, attack intermediaries, and even wipe information on the device itself. .