IoT malware tripled in the first half of 2018

Cryptocurrency mining, DDoS attacks and botnet activities are becoming more prevalent

A collection of IoT devices

Kaspersky's latest IoT Lab Report has revealed that Internet of Things malware has tripled in the first half of 2018 and attacks are becoming more sophisticated as hackers realise the financial opportunities of breaking into networked devices.

One of the biggest problems the industry is facing is that attacks, such as malicious cryptocurrency mining, DDoS attacks and botnet activities are becoming more prevalent and harder for manufacturers to combat.

Using brute force to guess passwords at a shocking rate is the most commonly used methods of attack by criminals, accounting for 93% of hacking methods they use, while routers were the most used type of equipment to bombard what the company describes as "honeypots" - the IoT test devices used as a gateway for an attack.

"For those people who think that IoT devices don't seem powerful enough to attract the attention of cybercriminals, and that won't become targets for malicious activities, this research should serve as a wake-up call," David Emm, principal security researcher at Kaspersky Lab said.

Advertisement - Article continues below
Advertisement - Article continues below

"Some smart gadget manufacturers are still not paying enough attention to the security of their products, and it's vital that this changes and that security is implemented at the design stage, rather than considered as an afterthought. At this point, even if vendors improve the security of devices currently on the market, it will be a while before old, vulnerable devices have been phased out of our homes."

Kaspersky explained the main reason criminals are using the IoT as a way of breaking into devices is to harness them as a gateway to implement a DDoS attack using botnets. However, other motivations for attacking IoT devices include aiming to turn off competing malware, fix vulnerabilities in installed malware and shut down vulnerable services on the device so other malware can't use security holes.

Emm added that one of the biggest concerns of security researchers and manufacturers should be the rate at which attacks are customised and new attacks are developed.

"While previously exploited breaches have not been fixed, criminals are constantly discovering new ones," he said. "IoT products have therefore become an easy target for cybercriminals, who can turn simple machines into powerful devices for illegal activity, such as spying, stealing, blackmailing and conducting Distributed Denial of Service (DDoS) attacks."

Featured Resources

Transform the operator experience with enhanced automation & analytics

Bring networking into the digital era

Download now

Artificially intelligent data centres

How the C-Suite is embracing continuous change to drive value

Download now

Deliver secure automated multicloud for containers with Red Hat and Juniper

Learn how to get started with the multicloud enabler from Red Hat and Juniper

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now



Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019

Best antivirus for Windows 10

3 Sep 2019

Best free malware removal tools 2019

8 Mar 2019

Most Popular


Patch issued for critical Windows bug

11 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019

Buy IT to grow, not slow, your business

25 Nov 2019
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019