SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers
Story image
Malware targeting IoT devices skyrockets as transactions rise 1,500%
Thu, 27th Feb 2020
FYI, this story is more than a year old

Zscaler today announced the release of the company's second annual Internet of Things (IoT) report, which reveals a massive rise in the rate of usage of IoT devices and with it, an increase in cyber attacks against devices.

According to the report, Zscaler customers are generating more than 1 billion IoT transactions per month in the Zscaler cloud.

This amounts to a 1,500% increase over the period between this and 2019's report.

By analysing two weeks of this traffic through Zscaler cloud, Zscaler found 553 different IoT devices across 21 categories from 212 manufacturers.

The company also found and blocked 14,000 IoT-based malware attempts per month.

Key Findings: Unauthorised IoT devices on the rise:

The top unauthorised IoT devices Zscaler observed include digital home assistants, TV set-top boxes, IP cameras, smart home devices, smart TVs, smartwatches, and even automotive multimedia systems.

Manufacturing - retail industries top IoT traffic volume 

Manufacturing and retail customers generated the highest IoT traffic volume (56.8%) followed by enterprises (23.7%), entertainment and home automation (15.7%), and healthcare (3.8%).

Majority of IoT transactions are insecure

83% of IoT-based transactions are occurring over plain-text channels, whereas only 17% are using secure (SSL) channels.

Exponential increase of IoT malware: 

Zscaler blocked 14,000 IoT-based malware attempts per month. That number has increased more than seven times than the May 2019 research.

New exploits emerging to target unauthorized devices: 

New exploits that target IoT devices are popping up all the time, such as the RIFT botnet, which looks for vulnerabilities in network cameras, IP cameras, DVRs, and home routers.


We have entered a new age of IoT device usage within the enterprise,” says Zscaler vice president of security research Deepen Desai. 

“Employees are exposing enterprises to a large swath of threats by using personal devices, accessing home devices, and monitoring personal entities through corporate networks,” says Desai.

“As an industry, we need to implement security strategies that safeguard enterprise networks by removing shadow IoT devices from the attack surface while continuously improving the detection and prevention of attacks that target these devices.

Organisations around the world are observing this Shadow IoT phenomenon, in which employees are bringing unauthorised devices into the enterprise.

With an unprecedented increase in unknown and unauthorised devices, IT and security teams often won't know that these devices are on the corporate network nor how they impact an organisation's overall security posture, the study finds.

As manufacturers bring more devices to market, the IoT threat landscape and its potential for breaches is expanding and changing.

The incredibly fast pace of IoT devices arriving to the market means organisations are scrambling to gain an understanding of what types of devices are communicating data, and how to secure the IoT ecosystem as a whole.

From their inception, IoT devices were meant to be disposable, short-term investments due to low acquisition cost, inherent flaws, and the speed with which the device software becomes irrelevant/end-of-life, says Zscaler.

There is no protocol for continuous testing, updating software, or patching, and yet these devices are all connected to the internet and to many corporate networks.

Over the quarter, Zscaler blocked approximately 42,000 transactions which were IoT-based malware and exploits. 

The top malware families included Mirai, Gafgyt, Rift, Bushido, Demonbot and Pesirai. 

The top destinations connected to by IoT malware families and exploits are the United States, the UK, Russia, The Netherlands and Malaysia.