Botnet traffic originating from unsecured IoT devices, which enforces distributed denial of service (DDoS) on IoT networks, has increased fivefold in the past year.
According to the report, this increase stems from more profit-oriented hacking groups and more consumer IoT devices, and coincides with Russia’s war with Ukraine last February. The number of infected IoT devices involved in botnet-driven DDoS attacks has increased from approximately 200,000 a year ago to approximately 1 million.
These devices generate more than 40% of all DDoS traffic today, and the most common malware found in telecom networks is a bot malware that scans for vulnerable devices. This is a type of malware that is related to various An IoT botnet-related tactic, the report also found that the number of Trojans, smuggled malware code, and targeting personal banking information in mobile devices has doubled to 9%.
The problem lies with consumer IoT devices in terms of the number of attack vectors and inherent security; the report concludes that many smart refrigerators, medical sensors, and smartwatches Security measures are lax. At the same time, the report said that as people returned to work, malware infection rates in home networks halved during this period, from 3% during the new crown epidemic to 1.5%, closer to the pre-pandemic level of 1% .
The scale and complexity of today's cybercriminal activities are extremely complex. A single botnet DDoS attack may involve hundreds of thousands of IoT devices, posing a major threat to global networks.
To reduce risks, service providers, vendors and regulators must work to develop stronger 5G network security measures, including implementing telecom-centric Threat detection and response, and implementing strong security practices and awareness at all enterprise levels.
The above is the detailed content of DDoS attacks using IoT bots increase fivefold in one year. For more information, please follow other related articles on the PHP Chinese website!