IoT Botnets & DDoS Attacks: What you need to know

The Internet of Things (IoT) brings the promise of efficiency and innovation to the enterprise. IoT also profoundly expands the threat surface for your organization.

The issue of botnets that leverage Internet of Things devices was largely ignored until the internet itself came crashing down one morning not long ago. Some of the most popular destinations were suddenly unavailable. Within minutes, IoT botnets went from a relatively obscure and unappreciated technology story to front page news.

IoT botnets are not a new phenomenon. Arbor has seen them for several years used to launch DDoS attacks, send spam, engage in man-in-the-middle (MitM) credentials hijacking and other malicious activities. What is new is attackers interest in exploiting this fast growing army of unsecured devices.

  • 2014: A large IoT botnet would have 75,000 compromised devices.
  • 2016: The now-infamous Mirai botnet that took down large portions of the internet was originally leveraging 500,000 devices. The botnet source code has been released and attackers are innovating and growing the botnet on a daily basis.

No vendor has more experience or a better understanding of the Tactics, Techniques and Procedures (TTPs) of attackers who leverage IoT botnets.

The stakes HAVE changed. Learn how can we help you meet this challenge.

stakes video

IoT BOTNETS & DDoS ATTACKS

The Internet of Things (IoT) brings the promise of efficiency and innovation to the enterprise. IoT also profoundly expands the threat surface for your organization.