https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Best Practices


IoT Security

IoT Insecurity: 6 Common Attacks and How to Protect Customers

Can you help customers cope with threats to new technology?

… there are typically no security mechanisms at the IoT endpoint, and the attacker can remain hidden within a traditional enterprise security framework.

Mitigating IoT threats typically requires that the enterprise upgrade firmware and closely manage components. Both of these tasks can take a substantial amount of time, which is one reason IoT security is a great opportunity for partners.

Let’s look at how a successful attack might happen.

Attackers commonly scan for vulnerable connected devices. Once found, they propagate an attack, like a worm, to compromise a large number of devices in a short amount of time. For example, the Mirai botnet has been used to compromise millions of IoT devices. Additionally, Mirai has been used to launch DoS attacks on cloud and network infrastructure. The DYN-managed DNS service infrastructure was attacked by Mirai-controlled IoT devices and ended up generating an estimated 1.2 terabits per second of traffic.

My team recently worked with a leading ISP that was attacked by a variant of Mirai. The attack exploited a command injection vulnerability in the TR-069 protocol on port 7547. Since this port was open and accessible from the internet, it enabled an outside attacker to mount a large-scale infection attack, rendering thousands of devices unusable. During the course of our investigation, we discovered another Mirai attack wave targeting routers that were using a default username and password combination.

These impacted devices were used as part of a DDoS campaign that targeted the ISP network infrastructure. The large-scale DoS originating from these devices within the network effectively choked the links and reduced the quality of service to its consumers, thus impacting business and consumer confidence in the ISP.

The above example clearly demonstrates the problem with default device configuration and weak passwords. As many IoT devices offer out-of-box connectivity, most users remain blissfully unaware of the inherent security risks — which is where partners come in.

Readying Cloud Security for IoT

As your enterprise customers move toward multicloud architectures, workloads must be segmented, and policy-based controls need to be applied on the connections between various workloads; however, these fundamental cloud-security controls are not enough. If an attacker penetrates the cloud, he might be able to blend with allowed traffic to move laterally from a compromised IoT device to a more attractive target.

First, some basics. Many IoT devices lack integrated security controls, which makes them attractive targets for the following exploitations:

  • Passwords: Most IoT devices have default passwords baked into firmware that provide attackers with direct access to device. The remaining devices are typically protected by weak passwords that make them easy targets for brute-force attacks. Look for the ability to reset passwords, and make sure it happens on each device.
  • Protocols: IoT devices use a wide variety of protocols for local and remote-server communications. An insecure implementation of any protocol may allow attackers to eavesdrop on messages. For example, MQTT (message queuing telemetry transport) is a popular publisher/subscriber protocol, used as a broker service to exchange messages between clients. An insecure broker will allow attackers to compromise the IoT network managed by the service, so watch for the most up-to-date versions.
  • Interfaces: Some IoT devices use a restful API interface that allows the sensor to upload information over the internet. An insecure implementation potentially allows an attacker to access private information. The Google NEST thermostat weather-update service that leaked the home location of users is a prime example of an insecure restful API interface implementation that attackers were able to use to their advantage. Almost all IoT devices provide an interface so that it can be managed it from the cloud, web or a mobile device. If the interface is vulnerable, attackers can extract sensitive information, do account enumeration and mount injection attacks, which might provide the attacker complete control of the device.

Beyond these, to prevent an attacker from moving deep inside the network and blending in with legitimate traffic, enterprises need …

  • Page 1
  • Page 2
  • Page 3
Tags: Agents Best Practices Cloud Data Centers IoT Security

Most Recent


  • Why DevOps Teams Need Security Skills and How Shift Left Tools Help
    Developers need cloud-native security skills and tools to build secure code from the start to mitigate risks.
  • Kim Zetter at Black Hat
    Black Hat USA: No Excuses for Cyberattacks to Catch Critical Infrastructure Off Guard
    Critical infrastructure remains just as vulnerable as it was years ago.
  • Partner Program Changes
    Partner Program Updates: Microsoft, TD Synnex, AppSmart, Cisco, Verizon
    Verizon is pushing channel integration big-time, and Microsoft appointed a chief partner officer.
  • Nutanix Layoffs Coming, Analysts Point to 'Significant Overspending'
    It was “long overdue,” one analyst said.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Ransomware skull and crossbones
    JBS Did What it 'Needed to Do' with $11 Million Ransom Payment
  • Cloud Certification
    CompTIA Updates Cloud+ Certification, Drops New AI Guide for Businesses
  • White House
    White House to Private Sector SMEs: Get Serious About Cybersecurity
  • Stressed young people
    More Partner Pain Points: MSPs On Lack of End-to-End Security, 'New Normal'

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

Partner Program Updates: Microsoft, TD Synnex, AppSmart, Cisco, Verizon

August 11, 2022

Channel Futures and Channel Partners Ready Trio of Powerhouse Summits

August 11, 2022

Black Hat USA: Former CISA Director Says Cybercrime to Get a Lot Worse Before Better

August 11, 2022

Industry Perspectives

View all

How to Take Shared Responsibility for Securing Cloud

August 11, 2022

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

ThreatLocker Preaches Zero Trust, Addresses Industry Competition

ScienceLogic Debuts New Partner Portal

August 9, 2022

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

June 27, 2022

IBM, Partners and the $1 Trillion Hybrid Cloud Opportunity

June 26, 2022

Twitter

ChannelFutures

Boost privacy by design with #shiftleft mindset and add #security to cloud deployments from start, says… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

Say sayonara to contract renewals - @KaseyaCorp responds to mounting customer concerns with significant changes.… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

.@Kyndryl, @Five9 partnership will focus on cloud-based #contactcenter solutions. dlvr.it/SWTFPx https://t.co/WGQedUjSB1

August 11, 2022
ChannelFutures

How cloud providers and customers can work together to safely share and secure responsibility in the cloud. @Cisco… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

See the latest updates from @verizonbusiness, @GetNerdio, @AppSmartcom, @CiscoPartners and other companies.… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

.@nutanix said to lay off 4% of workforce by October, as company cites macroeconomic issues. dlvr.it/SWSMDN https://t.co/w6JeqkI7r6

August 11, 2022
ChannelFutures

#BHUSA Day 1 with Chris Krebs, @cybereason, @keepersecurity, @BreachQuest, @awscloud and @splunk. #cybersecurity… twitter.com/i/web/status/1…

August 11, 2022
ChannelFutures

Have you registered for the @MSP_Summit yet? It’s just about a month away, so don’t wait. Here’s a sneak preview of… twitter.com/i/web/status/1…

August 11, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X