Directory of RSS feeds

RSS feeds in the directory: 2817

Added today: 0

Added yesterday: 0

Business / Finance

Brain hack: the malware hijacks the Internet of things monitoring of the banking press 17.07.2019 at 06:30

Banking and financial news on the website

Smart devices — watches, smart televisions, toys, video recorders and refrigerators — around the world in 2018, was attacked by a virus four times more often than in 2017. Such data "news" provided by the virus lab, "Dr. Web". This year attacks will be even greater: only the first six months was 71.5 million such incidents, and by the end of December their number may exceed already 100 million, analysts say. Malware can block Internet of things (IoT), and transfer control of them to criminals. In Russia, these gadgets is not much, but the intensity of the attacks is growing, experts warn.

Inhuman the infection

Analysts "Doctor Web" found a number of virus attacks on smart devices in 2018 amounted to 99.2 million vs. 23.7 million the year before. But in 2019 record can be broken again — only for the first two quarters of the world was 71.5 million such incidents and the end of the year figures may exceed 100 million, told "Izvestia" the representative of "Doctor Web". Data attacks the company gets with the help of special "traps" to viruses: they "lure" malware posing as smart devices.

Separately data on the number of cyber attacks on Russian smart device "Doctor Web" does not. Number of IoT devices is growing in our country and in the world in proportion to the number of such products (in Russia it is not yet too high), according to the operating Director of the center for monitoring and responding to cyber attacks "Rostelecom-solar" Yudakov Anton.

As shown by the analysis company, the most popular category of software from malicious Trojans for DDoS attacks that cause congestion of the Internet resources (for example, sites are not available). In second place with malicious software that allows you to control smart devices without user's knowledge, stealing data of the users to change the algorithms of their work. In addition, gaining popularity of the program, allow the secret from the owners of the devices to generate them (mine) is a cryptocurrency noted in the "Doctor Web". There are malware that combines several of these functions, added the company.

most Often, the infected devices are used to conduct DDoS-attacks and spam, said, "Izvestia" Yudakov Anton. According to him, fall under the scope of custom routers, network storage, video cameras and recorders, the system "smart home", toys and baby monitors, smart TVs and so on — everything that is used for remote access and control.

Hacking a private gadget can be used to harm large organizations. This is mainly targeted infrequent incidents, nevertheless they can in two or three days to stop the main business process of the victim, said the product Manager of M2M and IoT "Beeline Business" Maxim Pavlov. Most often observed attacks on mobile applications and platforms. In recent years, in connection with the mass migration to IP telephony special distribution received a phone attack on the digital PBX and call-centers of large companies, lists the expert. According to him,the main blow assume the service platform, such as applications for taxi. This happens when being non-competitive struggle for the market.

the phantom menace

the Reason for the increasing number of attacks on smart devices are not only widely spread, but in the carelessness of producers and users, according to the "Doctor Web". For example, to connect smart appliances to the Internet can be used simple or well-known pair "login-password", which is installed by default on hundreds of thousands of models, the study says. Their owners either don't think about changing is preset at factory settings, or can't do due to limitations of the manufacturers, emphasize the authors.

In most cases, to seize control of the devices of the Internet of things is quite simple, said Anton Yudakov. While such attacks are associated with special risk of cyber criminals and monetized in many different ways: from the direct theft of financial data or private information of any user to use the infected devices in an IoT botnet, he says.

Certainly, the number of attacks will increase as their complexity, predicts Maxim Pavlov. Dynamics of growth of number of such incidents and their nature in Russia, most likely, no different from the world, told "Izvestia" Chairman of the technical Committee "Cyber physical systems" at Rosstandart Nikita Utkin. While users often do not notice the interference of malicious software in their gadgets. However, when large-scale Internet of things will be implemented in industry, transport, municipal economy, such cases can lead to very serious consequences, warns Nikita Utkin.

is to say that our country is experiencing a viral epidemic associated with the IoT, is incorrect, says commercial Director of "the Outpost" Alexander Sanin. There are two attack vectors: the first is the theft of valuable user information via a smart device, such as personal data or information about payment cards, says Alexander Sanin. The second vector — the use of compromised devices to create a botnet and further earnings by selling services on the organization of DDoS-attacks. The first vector is quite rare to steal really valuable information, he said. The second attack vector is not particularly profitable. So, to say that all the hackers of the world suddenly rushed to attack smart devices and they have stopped making the "old way" clearly premature, says Alexander Sanin.

the Main rules tiberghien against IoT devices — caution in purchasing and using smart gadgets little-known manufacturers. Also, do not use the preset and easily pick up the password, time to update software and firmware, says Anton Yudakov. In addition, it should be possible to limit the network access device: for example, is unlikely to give guests the opportunity to manage your smart kettle via your home Wi-Fi is enough, if there is such a possibility from the owner, the expert concludes.