Fortinet report: more and more cyber attacks on IoT companies and devices

Fortinet presented the results of the latest report on IT threats. The global IT threat report is a quarterly review, which is a summary of analytical data collected by FortiGuard Labs laboratories. According to him, the number of detected exploits increased by 82% compared to the previous quarter. Cybercriminals are also increasingly targeting IoT devices.

Fortinet: a significant increase in the number of exploits, encrypted traffic and attacks on IoT

According to data in the fourth quarter of 2017, an average of 274 exploits was detected. This is an increase of 82% compared to the previous quarter. The number of detected malware families (by 25%) and unique variants increased by 19%, which indicates the ongoing evolution of tools used by cybercriminals.

The share of encrypted traffic using HTTPS and SSL in attacks also increased. Encryption can certainly help in data protection, but at the same time reduces the visibility of the network, which is a real challenge for traditional security solutions.

Three of the twenty largest attacks were identified as targeted at IoT devices. Unlike previous attacks, focused on one software bug, new IoT botnets (eg Reaper, Hajime) use many vulnerabilities at once. This type of cyber attack is much more difficult to resist. Reaper's ability is demonstrated by the increase in the number of related exploits from 50,000 to 2.7 million in just a few days. In addition, Fortinet experts have detected four times more malicious software activity targeting Wi-Fi cameras.

The ransomware software is not losing popularity. Locky was the most widespread variant and GlobeImposter was in second place. There was also an interesting change in Darknet. Bitcoin is no longer the only cryptocurrency used to pay the ransom, and cybercriminals also accept eg Monero.

The phenomenon of cryptojacking is growing. Cybercriminals use the computing power of computers of unsuspecting victims to extract them.

The number of detected security gaps in industrial control and security systems is increasing. Successful attacks of this type can cause significant damage with far-reaching consequences, for example by stopping the delivery of electricity.

The Sundown exploit set has recently been detected by more organizations than any other. Sundown uses steganography , a type of attack that embeds malicious code in graphic files. This method has not been widely used in recent years, but seems to be increasingly used by cybercriminals.

Add new comment

The content of this field is kept private and will not be shown publicly.

Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.