Cyber Actors Use Internet In Malicious Activities
FBI - IC3
   
 
More Today's News:
ߦ   Man Offered Others $500 To Assassinate ICE Agents
ߦ   Man Suffers Shark Bite In Galveston County Surf - PHOTO
ߦ   Paris Police Dept - Daily Activity/Arrests Summary
ߦ   Reward Offered for Most Wanted Fugitive with Ties to Laredo and San Antonio
ߦ   Surveillance Captured Brutal Beating Of Correction Officer
ߦ   Two Deputies Fired For Online Comments That Are Actually Racist
ߦ   Uniformed Officer Is Refused Service At Verizon Store
ߦ   Wind, darkness couldn't keep officer from answering shooting call during Hurricane Harvey
ߦ   2 Camden County police detectives shot in 'unprovoked' ambush
ߦ   Black Lives Matter Disrupts Wedding Of Officer Who Shot Stephon Clark
ߦ   Durham Co. Detention Officer Brooke Maynard Killed By Carjacker
ߦ   Elizabeth Warren Declares Criminal Justice Is Racist 'Front To Back'
ߦ   Gun-toting grandma shoots man accused of exposing himself
ߦ   New Orleans man pleads guilty to various drug trafficking and firearms crimes, resulting in the shooting of DEA Task Force Officer Stephen Arnold
ߦ   Officer Charged With Voluntary Manslaughter Before Investigation Is Done
ߦ   83 Year Old Man Found Dead Outside His Vehicle
ߦ   ATF Special Agent Hugh O’Connor Drowns Trying To Assist Boater
ߦ   City Partners with CCISD and Galveston County to Hold Active Shooter Training Drill
ߦ   Clerk charged with selling alcohol to teenage driver in fatal crash
ߦ   Constables Arrests Armed Robber
ߦ   Governor Greg Abbott extendeds the State Disaster Declaration for Texas counties affected by Hurricane Harvey
ߦ   Houston Fire Department Initiative Focuses on Firefighter Health and Safety
ߦ   Houston Police Dept - Call Summary
ߦ   Impressive Police Work by Deputies Leads to Arrest of Walgreens Robber
ߦ   Miami Police Officer Michaelle DeLoach Succumbs To Cancer
ߦ   Missing Baytown police officer found dead in field in Cove
ߦ   National Night Out 2018
ߦ   Police officer jumps off overpass to save boy's life in daring New York rescue
ߦ   VIRAL VIDEO: Police Stand Back As Man Stomps On Patrol Cars
ߦ   8-year-old dies after allegedly mistaking dad's crystal meth for breakfast cereal
ߦ   Chinese Nationals Convicted in Maritime Drug Smuggling Case
ߦ   City Manager's Update - League City
ߦ   Coast Guard ends search for boater near Moses Lake, Texas
ߦ   Correctional Officer Eng's Death Came After Fight With Inmate
ߦ   County Commissioner Pleads Guilty To Bribery

 
Search Archives:

Cyber actors actively search for and compromise vulnerable Internet of Things (IoT) devices for use as proxies or intermediaries for Internet requests to route malicious traffic for cyber-attacks and computer network exploitation. IoT devices, sometimes referred to as “smart” devices, are devices that communicate with the Internet to send or receive data. Examples of targeted IoT devices include: routers, wireless radios links, time clocks, audio/video streaming devices, Raspberry Pis, IP cameras, DVRs, satellite antenna equipment, smart garage door openers, and network attached storage devices.

IoT proxy servers are attractive to malicious cyber actors because they provide a layer of anonymity by transmitting all Internet requests through the victim device’s IP address. Devices in developed nations are particularly attractive targets because they allow access to many business websites that block traffic from suspicious or foreign IP addresses. Cyber actors use the compromised device’s IP address to engage in intrusion activities, making it difficult to filter regular traffic from malicious traffic.

Cyber actors are using compromised IoT devices as proxies to:

  • Send spam e-mails;
  • Maintain anonymity;
  • Obfuscate network traffic;
  • Mask Internet browsing;
  • Generate click-fraud activities;
  • Buy, sell, and trade illegal images and goods;
  • Conduct credential stuffing attacks, which occurs when cyber actors use an automated script to test stolen passwords from other data breach incidents on unrelated web-sites; AND
  • Sell or lease IoT botnets to other cyber actors for financial gain.

Cyber actors typically compromise devices with weak authentication, unpatched firmware or other software vulnerabilities, or employ brute force attacks on devices with default usernames and passwords.

Compromised devices may be difficult to detect but some potential indicators include:

  • A major spike in monthly Internet usage;
  • A larger than usual Internet bill;
  • Devices become slow or inoperable;
  • Unusual outgoing Domain Name Service queries and outgoing traffic; or
  • Home or business Internet connections running slow.

Protection and Defense

  • Reboot devices regularly, as most malware is stored in memory and removed upon a device reboot. It is important to do this regularly as many actors compete for the same pool of devices and use automated scripts to identify vulnerabilities and infect devices.
  • Change default usernames and passwords.
  • Use anti-virus regularly and ensure it is up to date.
  • Ensure all IoT devices are up to date and security patches are incorporated.
  • Configure network firewalls to block traffic from unauthorized IP addresses and disable port forwarding.
  • Isolate IoT devices from other network connections.

Additional Resources

For additional information on cyber threats to IoT devices, please refer to “Common Internet of Things Devices May Expose Consumers to Cyber Exploitation,” available at https://www.ic3.gov/media/2017/171017-1.aspx.

Victim Reporting

If you suspect your IoT device(s) may have been compromised, contact your local FBI office and/or file a complaint with the Internet Crime Complaint Center at www.ic3.gov.

Post a comment
Name/Nickname:
(required)
Email Address: (must be a valid address)
(will not be published or shared)
Comments: (plain text only)
Printer Friendly Format  Printer Friendly Format    Send to a Friend  Send to a Friend    RSS Feed  RSS Feed
  Facebook   Share link on Twitter Tweet  
© 1999-2018 The Police News. All rights reserved.