A honeypot experiment performed by researchers at the U.S. National Institute of Standards and Technology and the University of Florida has clarified hackers' goals in targeting Internet of Things (IoT) devices.
The researchers assembled the honeypot ecosystem from server farms, a vetting system, and a data capture/analysis infrastructure, using IoT honeypot emulators configured as actual devices on the Censys and Shodan search engines.
The ecosystem collated 22.6 million hits, and hackers employed similar techniques, like scanning for open ports, firewall disablement, and collecting data on target devices.
Recommended countermeasures include long account names, separating IoT device networks from critical assets, regular firmware and security updates, active device monitoring, and firewall/virtual private network protection.
View Full Article
Abstracts Copyright © 2022 SmithBucklin, Washington, DC, USA
No entries found