• About
  • Subscribe
  • Contact
Friday, March 20, 2026
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

Sophos sees continued threat of mobile, IoT malware in 2019

Criminals have been devising new ways to hijack connected devices to use as nodes in huge botnet attacks

by Eden Estopace
November 23, 2018
animation creepy

PHOTO by Pexels.com

“As homes and businesses adopt more internet-connected devices, criminals have been devising new ways to hijack those devices to use as nodes in huge botnet attacks,” security firm Sophos said in its most recent threat report.

The report, produced by SophosLabs researchers, explores changes in the threat landscape over the past 12 months, uncovering trends and how they are expected to impact cybersecurity in 2019.

Sophos said that among the many trends that SophosLabs saw in 2018 is the significant growth in the volume of attacks targeting internet of things (IoT) devices.

Though many of the cases simply involve changing default passwords to prevent reinfection, there were a few standout cases such as the VPNFilter, which was first discovered as an unexpected process running on a family of home routers.

“A discovery of malware that affected a broad class of home and small business networking devices in 2018 brought home the potential impact of malware that could persist on, and in some cases, permanently destroy those devices,” Sophos said.

With illegal Android apps on the increase, 2018 has seen also an increased focus in malware being pushed to phones, tablets, and other IoT devices.

“Elsewhere, Mirai Aidra, Wifatch, and Gafgyt delivered a range of automated attacks that hijacked networked devices to use as nodes in botnets to engage in distributed denial-of-service attacks, mine cryptocurrency and infiltrate networks,” Sophos said.

The report added that criminals can likewise leverage botnets to engage in distributed denial-of-service attacks (DdoS), mine cryptocurrency, infiltrate networks for the purposes of espionage or data theft, or even create chaos by “bricking” the device, taking it permanently offline or demanding a ransom to restore it to full functionality.”

Joe Levy, CTO, Sophos, as referenced in the SophosLabs 2019 Threat Report,  said that the threat landscape is undoubtedly evolving.

“Less-skilled cybercriminals are being forced out of business, the fittest among them step up their game to survive and we’ll eventually be left with fewer, but smarter and stronger, adversaries,” he was quoted as saying.

Related:  Survey reveals top edge computing workloads
Tags: cyberattacksInternet of ThingsIoTmobile and IoT malwareSophosSophos 2019 Threat ReportTechnology

Eden Estopace

No Result
View All Result

Recent Posts

  • Cainiao to transform e-commerce with global robotic warehouse network
  • Study reveals supply chain attacks emerge as top cyber threat in APAC
  • Zoom enhances workflow automation with expanded AI capabilities
  • New industrial UPS engineered for 50°C operation and dust resistance
  • GENESIS simulator addresses inventory challenges with AI innovation

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Artificial Intelligence
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Cloud, Platforms and Ecosystems
  • Commercial
  • Compliance and Governance
  • Computer, Storage, Networks, Connectivity
  • Construction
  • Consumer
  • Culture and Behaviour|People
  • Customer Engagement
  • Data Protection
  • Devices
  • Digital Transformation
  • Endpoint Security
  • ESG
  • ESG and sustainability
  • Future Workplace
  • FutureCOO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • HR, education and Training
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • People
  • Process
  • Remote work
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Tactics and Strategies
  • Technology
  • Telecommunications
  • TIBCO
  • Training and awarenes
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Cainiao Network

Cainiao to transform e-commerce with global robotic warehouse network

March 16, 2026
Photo by Tiger Lily: https://www.pexels.com/photo/photo-of-men-working-in-a-warehouse-4483860/

Study reveals supply chain attacks emerge as top cyber threat in APAC

March 13, 2026
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe