Categories: HackingSecurity

Internet of Things and principal cyber threats

Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to the popular paradigm?

Another week is starting and this morning the topic that I’ve found everywhere is Internet of Things (IoT), it is a growing paradigm that will influence our life in the next future, and probably it is already doing it. The Internet of Things, as explained in a previous post, refers all objects in daily life equipped with identifiers that allow their automatic inventory. Tagging of the Internet of Things could be achieved with various technologies such as the RFID, NFC, digital watermarking, QR code and muck more.
Unfortunately the rapid diffusion of the The Internet of Things technology is not accompanied by a rapid improvement of efficient security solutions for those “smart objects”.

Cybercrime is aware of the delay in securing The Internet of Things and it is expected an explosion of cyber attacks against a technology still helpless. The Internet of Things is a business opportunity for security firms and a great invention for every industry, everyone could benefit from their adoption, but we must carefully evaluate the cyber threats and the level of exposure of data managed by such useful devices.

The Internet of ThingsThe Internet of Things

Which are principal cyber threats that threaten The Internet of Things? I’ve found an interesting post by Symantec that identified the following potential risks

  • Denial of service – DDoS attacks could target all the end points of a working scenario, the offensive my cause the block of the network of network of smart devices paralyzing the service it provides.
  • Botnets and malware based attacks – Malware could be used by hackers to target every element of The Internet of Things architecture. A malicious code could be used to infect computers used to control the smart devices or to attack the software executed by the devices to turn them to unplanned use. Recently Symantec security experts have discovered a new Linux worm that was designed specifically to target the “Internet of things” infecting Intel x86-powered Linux devices. Each element of the network could be used to send Spam, to generate costly SMS messages, or indeed participate in a DDoS attack.
  • Weakening perimeters – The main problem of Internet of Things paradigm is that almost every physical object was generally not designed to be internet-connected, this consideration has a direct repercussion on the lack of network security that was not considered by design. We must consider that smart meter if hacked could give access to our domestic network, giving a hacker the possibility to spy on us or causing physical damage, for example by altering the operation of an oven or any other appliance, similar problems could be related to any industry.
  • Data BreachesOrganisations should be aware of the potential for unintended consequences of IoT use cases. These include potential privacy breaches (for example over-intrusive staff monitoring) and the possibility of ‘gaming the system’, for example customers simply walking through a store to gain loyalty points.
  • Inadvertent breaches – Data managed through the Internet of Things could be accidentally lost or exposed. Symantec provides the example the CEO’s car broadcasting its location, but more sensitive information could be leaked from the business environment.

The post avoided to consider device hacking, it could not be ignored the possible hack of these devices to turn them to unplanned use security experts believe that in the next future hackers will exploit new attack vectors from unexpected directions.

It is likely that attackers will migrate consolidated techniques of attack to The Internet of Things, Symantec experts according the post has no doubts

“We will no doubt see new variations on themes such as ‘man in the middle’ or ‘watering hole’ attacks, this time targeted at information flows from physical objects rather than people and their computers.”

Pierluigi Paganini

(Security Affairs –  Internet of Things, cyber security)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…

3 hours ago

Coinbase data breach impacted 69,461 individuals

Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…

11 hours ago

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

14 hours ago

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

15 hours ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

19 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

1 day ago