in

IoT devices can undermine your security. Here are four ways to boost your defences

Image: Getty/Morsa Images

Connected Internet of Things (IoT) devices such as printers, cameras and routers are leaving networks vulnerable to cyberattacks because they’re not being properly secured. 

And it isn’t just home and office networks that are being left open to exploitation by malicious hackers targeting the Internet of Things  – critical infrastructure is also vulnerable too because IoT security isn’t being managed correctly, potentially leaving industrial control systems exposed, Microsoft has warned. 

In monitoring threats against critical infrastructure and utilities, Microsoft said its researchers investigated water utility providers in the UK with exposed IoT devices within their networks. 

Also: Critical infrastructure is under attack from hackers. Securing it needs to be a priority – before it’s too late

Using what it described as “open-source intelligence” and Microsoft Defender Threat Intelligence data, the team searched for exposed IoT devices integrated into the networks of water utility providers and found that such facilities were using Draytek Vigor routers, which are intended for home use. It also spotted exposed Wi-Fi devices and cameras.

Microsoft said its researchers have elsewhere observed attackers using a known remote code execution vulnerability in Draytek Vigor devices (CVE-2020-8515) to deploy the Mirai botnet.

Also: The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats

“Once attackers establish device access, remote code execution vulnerabilities such as CVE-2020-8515 can then allow attackers to run malicious commands on devices, move laterally within the network, and access other vulnerable devices that were not directly exposed to the internet such as SCADA systems,” Microsoft warned.

While a patch has been available to protect Draytek routers against the vulnerability for over two years, the nature of IoT devices means that network administrators can forget to apply updates – or might be unaware that updates need to be applied at all. 

To help ensure Internet of Things devices, and the networks they’re connected to, are as secure and protected against cyberattacks as possible, Microsoft recommends four actions:

  1. Adopt a comprehensive IoT and OT security solution  By using an IoT-specific cybersecurity solution that provides visibility and monitoring of all IoT and operational technology (OT) devices, along with threat detection and response that enables vulnerabilities to be detected and mitigated, networks can be protected against attacks. 
  2. Enable vulnerability assessments  You can’t secure IoT devices if you don’t know they’re there. Regular vulnerability assessments can help to find unpatched vulnerabilities in IoT devices, so that the updates can be applied to prevent attackers from being able to exploit known issues. 
  3. Reduce the attack surface  IoT devices that have no need to face the open internet shouldn’t be exposed to it – eliminating unnecessary connections to IoT products reduces the number of entry points attackers can exploit. Network segmentation should also be applied, so in the event of an IoT device being breached, it’s not possible to move from there to industrial control systems or other critical systems. 
  4. Increase network security  Enforcing additional security measures, such as enforcing multi-factor authentication, helps to prevent attackers from being able to access systems, even if they have the correct username and password. 

“Given the severity of these attacks and their potential impact on the utility providers’ operations and even the safety of their customers, it becomes crucial to recognize the importance of proper security practices around IoT and OT unmanaged devices to ensure that such attacks do not happen,” said the Microsoft Defender for IoT research team. 

MORE ON CYBERSECURITY


Source: Information Technologies - zdnet.com

Finally, is this the end for the fax machine?

Methane research takes on new urgency at MIT