Categories: HackingSecurity

Internet of Things and principal cyber threats

Internet of Things, a business growing at a compound annual rate of 7,9%, which are the principal cyber threats to the popular paradigm?

Another week is starting and this morning the topic that I’ve found everywhere is Internet of Things (IoT), it is a growing paradigm that will influence our life in the next future, and probably it is already doing it. The Internet of Things, as explained in a previous post, refers all objects in daily life equipped with identifiers that allow their automatic inventory. Tagging of the Internet of Things could be achieved with various technologies such as the RFID, NFC, digital watermarking, QR code and muck more.
Unfortunately the rapid diffusion of the The Internet of Things technology is not accompanied by a rapid improvement of efficient security solutions for those “smart objects”.

Cybercrime is aware of the delay in securing The Internet of Things and it is expected an explosion of cyber attacks against a technology still helpless. The Internet of Things is a business opportunity for security firms and a great invention for every industry, everyone could benefit from their adoption, but we must carefully evaluate the cyber threats and the level of exposure of data managed by such useful devices.

Which are principal cyber threats that threaten The Internet of Things? I’ve found an interesting post by Symantec that identified the following potential risks

  • Denial of service – DDoS attacks could target all the end points of a working scenario, the offensive my cause the block of the network of network of smart devices paralyzing the service it provides.
  • Botnets and malware based attacks – Malware could be used by hackers to target every element of The Internet of Things architecture. A malicious code could be used to infect computers used to control the smart devices or to attack the software executed by the devices to turn them to unplanned use. Recently Symantec security experts have discovered a new Linux worm that was designed specifically to target the “Internet of things” infecting Intel x86-powered Linux devices. Each element of the network could be used to send Spam, to generate costly SMS messages, or indeed participate in a DDoS attack.
  • Weakening perimeters – The main problem of Internet of Things paradigm is that almost every physical object was generally not designed to be internet-connected, this consideration has a direct repercussion on the lack of network security that was not considered by design. We must consider that smart meter if hacked could give access to our domestic network, giving a hacker the possibility to spy on us or causing physical damage, for example by altering the operation of an oven or any other appliance, similar problems could be related to any industry.
  • Data BreachesOrganisations should be aware of the potential for unintended consequences of IoT use cases. These include potential privacy breaches (for example over-intrusive staff monitoring) and the possibility of ‘gaming the system’, for example customers simply walking through a store to gain loyalty points.
  • Inadvertent breaches – Data managed through the Internet of Things could be accidentally lost or exposed. Symantec provides the example the CEO’s car broadcasting its location, but more sensitive information could be leaked from the business environment.

The post avoided to consider device hacking, it could not be ignored the possible hack of these devices to turn them to unplanned use security experts believe that in the next future hackers will exploit new attack vectors from unexpected directions.

It is likely that attackers will migrate consolidated techniques of attack to The Internet of Things, Symantec experts according the post has no doubts

“We will no doubt see new variations on themes such as ‘man in the middle’ or ‘watering hole’ attacks, this time targeted at information flows from physical objects rather than people and their computers.”

Pierluigi Paganini

(Security Affairs –  Internet of Things, cyber security)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.