57% of IoT Devices Are Susceptible to Severe Attack, Report Finds

The report also found that a vast majority of IoT devices are unencrypted, potentially exposing personal and confidential data.

SANTA CLARA, Calif. — A new report by Unit 42, a threat intelligence team at Palo Alto Networks, details how more than half (57%) of all Internet of things (IoT) devices are vulnerable to acute cybersecurity attacks.

IoT is a network of Internet-connected objects able to collect and exchange data, such as IP phones, printers, intercom systems, and security cameras. More than 30% of all network-connected endpoints are IoT devices and a 2019 Gartner report found the adoption of enterprise IoT grew 21.5% from 2018 to 2019, totaling an estimated 4.8 billion devices.

Unit 42 researchers analyzed security incidents spanning 1.2 million IoT devices in thousands of locations across enterprise IT and healthcare organizations in the U.S.

Overall, they found that “the general security posture of IoT devices is declining, leaving organizations vulnerable to new IoT-targeted malware as well as older attack techniques that IT teams have long forgotten.”

Researchers also discovered “a shift away from attackers’ primary motivation of running botnets to conduct DDoS attacks via IoT devices to malware spreading across the network via worm-like features, enabling attackers to run malicious code to conduct a large variety of new attacks.”

Password-related attacks were also found to be prevalent on IoT devices because of weak manufacturer-set passwords and poor password security practices.

Due to the overall lack of security measures in place, the report estimates 57% of IoT devices are vulnerable to medium- or high-severity attacks. Researchers also discovered 98% of all devices are unencrypted, exposing personal and confidential data on the network.

Researchers found healthcare organizations are at even greater risk as they are “displaying poor network security hygiene.” For example, approximately 72% of healthcare organizations are combining IoT and IT assets on virtual LAN (logical grouping of devices on the same computer network), enabling infected employee computers to spread malware onto other IoT devices.

Additionally, 83% of medical imaging devices are running on outdated operating systems — a 56% jump from 2018 due to the Windows 7 operating system reaching its end of life. This is particularly concerning as 51% of threats for healthcare organizations involve imaging devices, which “[disrupts] the quality of care and [allows] attackers to exfiltrate patient data stored on these devices.”

To help reduce exposure to IoT threats, Unit 42 recommends organizations take the following precautions:

  • Know your risk — discover IoT devices on the network
  • Patch printers and other easily patchable devices
  • Segment IoT devices across VLANs
  • Enable active monitoring
  • Think holistically — orchestrate the entire IoT lifecycle
  • Expand security to all IoT devices through product integration

For more detailed information on steps to take to reduce IoT risks, download the full report here.


This article first appeared on SSI sister publication Campus Safety.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

About the Author

Contact:

Amy Rock is the executive editor for SSI sister publication Campus Safety. She graduated from UMass Amherst with a bachelor’s degree in communications and a minor in education. She has worked in the publishing industry since 2011, in both events and digital marketing.

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters