Do you know? As many as 20% of companies experience at least one IoT-based attack in the last three years. You don’t even need to have a smart home or smartphone to be a victim of IoT device attacks. Once out of the house, you are already in the control of a wearable device and a broken IP camera.
As mentioned in the previous report, ‘The Hunt for IoT: The Growth and Evolution of Thingbots (Volume 4)’, F5 Labs expanded the coverage of attack data collected including services commonly used by IoT devices but not limited to telecommunications networks (telnet) . The top twenty ports commonly used IoT devices are also profiled in this report.
The following are the main findings from the attack data collected on January 1 – June 30, 2018:
• IoT devices are the target of number one attacks on the internet, surpassing web servers and applications, email servers, and databases (which should not be accessible via the internet).
• As expected, the number of telnet attacks has decreased which is most likely due to the thingbot sweeping on IoT devices operating on port 23.
• In March, attack traffic increased sharply on each port connected with IoT and examined by F5 Labs. Given that 84% of this traffic comes from the telnet industry, there is a possibility of an increase in the number of thingbots that infiltrate IoT devices on telnet.