Story image

IoT a hot topic in cybercriminal underbelly

Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to new research from Trend Micro, which says the monetisation of IoT attacks is increasing.

The research analysed forums in the Russian, Portuguese, English, Arabic, and Spanish language-based underground markets to determine how cybercriminals are abusing and monetising connected devices. The results reveal that the most advanced criminal markets are Russian and Portuguese-speaking forums, in which financially driven attacks are most prominent. 

In these forums, cybercriminal activity is focused on selling access to compromised devices, mainly routers, webcams and printers, so they can be leveraged for attacks.

"We've lifted the lid on the IoT threat landscape to find that cybercriminals are well on their way to creating a thriving marketplace for certain IoT-based attacks and services," says Steve Quane, executive vice president of network defense and hybrid cloud security for Trend Micro. 

"Criminals follow the money -- always. The IoT market will continue to grow, especially with landscape changes like 5G. While IoT attacks are still in their infancy, we also found criminals discussing how to leverage industrial equipment for the same gain," he explains. 

"Enterprises must be ready to protect their Industry 4.0 environments."

According to Trend Micro's findings, most conversations and active monetisation schemes are focused on consumer devices. However, discussions on how to discover and compromise connected industrial machinery are also occurring, especially the vital programmable logic controllers (PLCs) used to control large-scale manufacturing equipment. 

The most likely business plan to monetise attacks against these industrial devices involves digital extortion attacks that threaten production downtime.

Additionally, the report predicts an increase in IoT attack toolkits targeting a broader range of consumer devices, such as virtual reality devices. The opportunities for attackers will also multiply as more devices are connected to the internet, driven by 5G implementations.

"Trend Micro urges manufacturers to partner with IoT security experts to mitigate cyber-related risks from the design phase," says Quane. 

"End users and integrators should also gain visibility and control over connected devices to be aware of and curb their cyber risk."

Story image
14 Jan
Cloud adoption trends: SSO adoption lagging
Research found that only 34% of those who had adopted cloud-based solutions had implemented single sign-on (SSO), one of the most basic cloud security tools.More
Story image
13 Dec
FireEye rolls out threat intelligence platform for industrial systems
Now industrial control systems (ICS), operational technology (OT), internet of things devices, and other equipment used to manage interconnected physical processes, can be secured from cyber threats.More
Story image
19 Dec
BitSight enhances fourth-party risk management solution
BitSight for Fourth-Party enables customers to identify areas of business and cyber risk. It does this by automatically pinpointing connections between any organisation, its business partners, and potentially risky fourth parties.More
Story image
28 Nov
IDC names Trend Micro number one vendor for SDC security
The new independent report: Worldwide Software Defined Compute Workload Security Market Shares, 2018 revealed Trend Micro achieved a market share lead of 35.5%, almost triple its nearest competitor in 2018.More
Story image
09 Dec
Gartner names Fortinet a Challenger in WAN Edge Infrastructure
Fortinet was also recently named by Gartner as one of the highest three vendors in worldwide market share for enterprise SD-WAN equipment by revenue for Q2 2019.More
Story image
27 Nov
Interview: Microsoft's Diana Kelley talks talent gaps and D&I
Kelley recently spoke at Microsoft Asia’s new Experience Center, where she talked through her experience as a security CTO, as well as IoT security, what’s ahead in 2020, and diversity and inclusion both in the cybersecurity sector, and in technology.More