In the past few decades, the internet has transcended our screens and seamlessly integrated into our
everyday objects. From wearable devices to household appliances, vehicles, infrastructure, and
industrial equipment, the pervasive influence of the Internet of Things (IoT) has significantly
impacted our world. A report by "IoT Analytics" estimated that by 2023, there were 16.7 billion
active IoT devices, promising enhanced convenience and efficiency. However, this surge in IoT
adoption has brought forth substantial security concerns that demand our attention.
Security Challenges Beyond the Obvious
While some security concerns, such as data privacy issues, are readily apparent, others are more
intricate. In 2017, a hacker known as stackoverflowin compromised 150 thousand printers, coercing
them into producing unauthorized warning print jobs. This incident aimed to shed light on the
vulnerability of printers and underscored their potential as launch pads for botnet attacks. Botnet
attacks involve taking control of a large group of devices and deploying them for subsequent
malicious activities.
The Menace of Mirai
However, not all hackers operate with good intentions. In 2016, three consecutive Distributed Denial
of Service (DDoS) attacks targeted the domain name system provider Dyn, affecting services ranging
from Netflix and PayPal to Xbox Live. This notorious attack leveraged Mirai, a malware capable of
compromising remotely controlled devices for botnet attacks. The size of this botnet reached around
145 thousand devices, primarily consisting of IP cameras and home routers. Astonishingly, the
hackers responsible for Mirai even shared the malware's source code on GitHub, leading to the
continued emergence of its variants.
Beyond Child's Play
Contrary to stereotypes, hackers are not always teenagers engaging in casual mischief. Nation-state
actors have increasingly participated in cyberwarfare and espionage, with infrastructure becoming a
prime target for Russian and Chinese state-sponsored hackers. In 2022, the Russia-backed Sandworm
hackers disrupted the Ukrainian grid by exploiting the grid's operational technology (OT), a subset
of IoT focused on business applications.
Understanding IoT Vulnerabilities
Setting aside high-profile targets, most IoT devices are personal, household, or basic business
devices. Exploiting the lack of regular security updates, or sometimes the absence of updates
altogether, hackers can capitalize on vulnerabilities throughout a device's operational lifespan.
Many manufacturers still use universal default passwords, employ weak or no encryption techniques,
inadequately protect personal data, and often fail to publicly disclose vulnerabilities. These
issues not only compromise individual users but also pose a threat to the broader internet
community.
Navigating Uncertainty for Progress
As the number of IoT devices continues to surge annually, so does the potential attack surface. In a
world where data holds increasing value, this growth is expected to accelerate, leading to more
frequent and sophisticated attacks. Yet, amid this uncertainty, opportunities arise. Various
industries are investing substantial sums in IoT security, witnessing the emergence of startups
dedicated to the cause. Governments are also actively addressing cyber threats, implementing
regulations to ensure IoT security and taking action against hacker groups. Together, these efforts
aim to create a more secure and resilient internet for all.