The Internet of Things (IoT) is a system of connected computing devices and objects using unique identifiers and sending data over a network without requiring human interaction. Many industries (for example, automobile, healthcare, appliance, et cetera) are or will be using IoT to operate more efficiently and better serve their customers.
Research using the web to identify a recent or potential future IoT attack. Summarize the attack you chose and discuss why it was or potentially may be successful. Based on your research, are there red flags one should look out for when considering using IoT-enabled devices to avoid becoming an attack victim?
Mirai Botnet is a notorious example of an IoT attack that targeted devices like DVRs, IP cameras, and routers. The attack involved compromising these devices using default or easily guessable credentials, turning them into “bots” that could be controlled remotely. These bots were then used to launch Distributed Denial of Service (DDoS) attacks, overwhelming websites and online services with traffic.
Why was it successful?
Red Flags to Look Out For: When considering using IoT-enabled devices, be aware of these red flags:
By being aware of these red flags and taking steps to protect your IoT devices, you can significantly reduce the risk of falling victim to attacks like Mirai Botnet.