• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Devices

The dangers of converting IoT devices into Mirai botnets

Paddy Harrington by Paddy Harrington
September 17, 2024
Photo by Amar  Preciado: https://www.pexels.com/photo/man-hands-holding-camera-27858211/

Photo by Amar Preciado: https://www.pexels.com/photo/man-hands-holding-camera-27858211/

A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the French hosting firm OVHcloud, security researcher Brian Krebs, or targets within the financial sector.

The recently discovered vulnerability appears to have been in the devices since 2019. What complicates matters is that these devices are past their end-of-support lifespan, meaning there are no available patches to remediate this issue.

When it comes to desktop management and security, security leaders recognize that the devices and the OS have a definitive lifespan. The manufacturer will stop supporting the hardware, and the OS maker will stop supporting the OS, like Microsoft will stop supporting Windows 10 in October 2025 and Apple stopped supporting macOS 11 Big Sur in September 2023.

Because of this lifecycle on desktops and mobile devices, IT operations teams have developed replacement strategies, often between two to five years depending on the industry, where devices are replaced because of ageing hardware and OSes are replaced based on their obsolescence. But what about your IoT devices?

For your anywhere-work users, what about the IoT devices within their homes? Does your business have a lifecycle and replacement strategy for these devices?

IoT devices have long lifespans. They’re purpose-built devices that perform certain tasks, but tend not to have the high-low resource cycles, continual off/on application cycles, and repeated user interactions experienced by PCs and servers.

Industrial devices like MRI machines or intelligent forklifts, which are both classified as IoT devices, don’t have the same usage patterns as a desktop or server computer, and businesses tend to believe these devices will live much longer than a five-year cycle. Most home users don’t expect to replace their Nest thermostat in five years or even 10.

But those devices, because they’re a computer with just a simple task structure, do have a lifespan, and their software/firmware needs to be maintained. And when the device reaches the end of life, it becomes a security hazard for your organization — whether it’s within your business network or at home for an employee.

Initiatives like IoT Security Trust Mark are trying to drive device manufacturers to adhere to standards of security, including code development lifecycles, and to label their devices appropriately, but this does nothing for the millions, if not billions, of IoT devices that are already deployed, have passed their end-of-life date, and are now vulnerable to attack.

Our report, The Top Trends In IoT Security In 2024, discussed what’s good and bad in IoT security, but security leaders need to take the initiative and start protecting their IoT devices before they’re used for nefarious purposes.

First published on Forrester blog

Related:  Visual analytics power the smart city vision
Tags: botnetsForresterMirai
Paddy Harrington

Paddy Harrington

Paddy Harrington is a senior analyst at Forrester advising security and risk professionals. He focuses on endpoint security on platforms ranging from desktop PCs to internet-of-things (IoT) devices. His research includes the endpoint’s impact on the security of business applications and data in light of the recent proliferation of edge devices and the evolving work environment. Previous work experience Harrington has 27 years of high-tech experience. Prior to coming to Forrester, Harrington developed learning and enablement solutions for the worldwide sales engineering teams at Citrix Systems, covering the entire portfolio of Citrix solutions. Earlier at Citrix, he led a sales engineering team targeting midmarket to enterprise organisations with focuses on healthcare and finance. His team helped customers achieve the secure delivery of their applications. Previously, as the CIO of a consulting services company, Harrington was instrumental in the firm’s growth into a larger provider of networking, application delivery, and application security solutions. Education Harrington received his Private Pilot License (PPL) from Embry-Riddle Aeronautical University.

No Result
View All Result

Recent Posts

  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe