INTERNET OF THINGS: OPPORTUNITIES FOR CYBER CRIME

<blockquote><p>The Internet of Things &lpar;IoT&rpar; refers to any object or device which connects to the Internet to automatically send and&sol;or receive data&period;<&sol;p><&sol;blockquote>&NewLine;<div class&equals;"mh-content-ad"><script async src&equals;"https&colon;&sol;&sol;pagead2&period;googlesyndication&period;com&sol;pagead&sol;js&sol;adsbygoogle&period;js&quest;client&equals;ca-pub-9162800720558968"&NewLine; crossorigin&equals;"anonymous"><&sol;script>&NewLine;<ins class&equals;"adsbygoogle"&NewLine; style&equals;"display&colon;block&semi; text-align&colon;center&semi;"&NewLine; data-ad-layout&equals;"in-article"&NewLine; data-ad-format&equals;"fluid"&NewLine; data-ad-client&equals;"ca-pub-9162800720558968"&NewLine; data-ad-slot&equals;"1081854981"><&sol;ins>&NewLine;<script>&NewLine; &lpar;adsbygoogle &equals; window&period;adsbygoogle &vert;&vert; &lbrack;&rsqb;&rpar;&period;push&lpar;&lbrace;&rcub;&rpar;&semi;&NewLine;<&sol;script><&sol;div>&NewLine;<p>As more businesses and homeowners use web-connected devices to enhance company efficiency or lifestyle conveniences&comma; their connection to the Internet also increases the target space for malicious cyber actors&period; Similar to other computing devices&comma; like computers or Smartphones&comma; IoT devices also pose security risks to consumers&period; The FBI is warning companies and the general public to be aware of IoT vulnerabilities cybercriminals could exploit&comma; and offers some tips on mitigating those cyber threats&period;<&sol;p>&NewLine;<h2><b><u>What are some IoT devices&quest;<&sol;u><&sol;b><&sol;h2>&NewLine;<ul>&NewLine;<li>Automated devices which remotely or automatically adjust lighting or HVAC<&sol;li>&NewLine;<li>Security systems&comma; such as security alarms or Wi-Fi cameras&comma; including video monitors used in nursery and daycare settings<&sol;li>&NewLine;<li>Medical devices&comma; such as wireless heart monitors or insulin dispensers<&sol;li>&NewLine;<li>Thermostats<&sol;li>&NewLine;<li>Wearables&comma; such as fitness devices<&sol;li>&NewLine;<li>Lighting modules which activate or deactivate lights<&sol;li>&NewLine;<li>Smart appliances&comma; such as smart refrigerators and TVs<&sol;li>&NewLine;<li>Office equipment&comma; such as printers<&sol;li>&NewLine;<li>Entertainment devices to control music or television from a mobile device<&sol;li>&NewLine;<li>Fuel monitoring systems<&sol;li>&NewLine;<&sol;ul>&NewLine;<h2><b><u>How do IoT devices connect&quest;<&sol;u><&sol;b><&sol;h2>&NewLine;<p>IoT devices connect through computer networks to exchange data with the operator&comma; businesses&comma; manufacturers&comma; and other connected devices&comma; mainly without requiring human interaction&period;<&sol;p>&NewLine;<h2><b><u>What are the IoT Risks&quest;<&sol;u><&sol;b><&sol;h2>&NewLine;<p>Deficient security capabilities and difficulties for patching vulnerabilities in these devices&comma; as well as a lack of consumer security awareness&comma; provide cyber actors with opportunities to exploit these devices&period; Criminals can use these opportunities to remotely facilitate attacks on other systems&comma; send malicious and spam e-mails&comma; steal personal information&comma; or interfere with physical safety&period; The main IoT risks include&colon;<&sol;p>&NewLine;<ul>&NewLine;<li>An exploitation of the Universal Plug and Play protocol &lpar;UPnP&rpar; to gain access to many IoT devices&period; The UPnP describes the process when a device remotely connects and communicates on a network automatically without authentication&period; UPnP is designed to self-configure when attached to an IP address&comma; making it vulnerable to exploitation&period; Cyber actors can change the configuration&comma; and run commands on the devices&comma; potentially enabling the devices to harvest sensitive information or conduct attacks against homes and businesses&comma; or engage in digital eavesdropping&semi;<&sol;li>&NewLine;<li>An exploitation of default passwords to send malicious and spam e-mails&comma; or steal personally identifiable or credit card information&semi;<&sol;li>&NewLine;<li>Compromising the IoT device to cause physical harm&semi;<&sol;li>&NewLine;<li>Overloading the devices to render the device inoperable&semi;<&sol;li>&NewLine;<li>Interfering with business transactions&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<h2><b><u>What an IoT Risk Might Look Like to You&quest;<&sol;u><&sol;b><&sol;h2>&NewLine;<p>Unsecured or weakly secured devices provide opportunities for cyber criminals to intrude upon private networks and gain access to other devices and information attached to these networks&period; Devices with default passwords or open Wi-Fi connections are an easy target for cyber actors to exploit&period;<&sol;p>&NewLine;<h3><b><i>Examples of such incidents&colon;<&sol;i><&sol;b><&sol;h3>&NewLine;<ul>&NewLine;<li>Cyber criminals can take advantage of security oversights or gaps in the configuration of closed circuit television&comma; such as security cameras used by private businesses or built-in cameras on baby monitors used in homes and day care centers&period; Many devices have default passwords cyber actors are aware of and others broadcast their location to the Internet&period; Systems not properly secured can be located and breached by actors who wish to stream live feed on the Internet for anyone to see&period; Any default passwords should be changed as soon as possible&comma; and the wireless network should have a strong password and firewall&period;<&sol;li>&NewLine;<li>Criminals can exploit unsecured wireless connections for automated devices&comma; such as security systems&comma; garage doors&comma; thermostats&comma; and lighting&period; The exploits allow criminals to obtain administrative privileges on the automated device&period; Once the criminals have obtained the owner’s privileges&comma; the criminal can access the home or business network and collect personal information or remotely monitor the owner’s habits and network traffic&period; If the owner did not change the default password or create a strong password&comma; a cyber criminal could easily exploit these devices to open doors&comma; turn off security systems&comma; record audio and video&comma; and gain access to sensitive data&period;<&sol;li>&NewLine;<li>E-mail spam attacks are not only sent from laptops&comma; desktop computers&comma; or mobile devices&period; Criminals are also using home-networking routers&comma; connected multi-media centers&comma; televisions&comma; and appliances with wireless network connections as vectors for malicious e-mail&period; Devices affected are usually vulnerable because the factory default password is still in use or the wireless network is not secured&period;<&sol;li>&NewLine;<li>Criminals can also gain access to unprotected devices used in home health care&comma; such as those used to collect and transmit personal monitoring data or time-dispense medicines&period; Once criminals have breached such devices&comma; they have access to any personal or medical information stored on the devices and can possibly change the coding controlling the dispensing of medicines or health data collection&period; These devices may be at risk if they are capable of long-range connectivity&period;<&sol;li>&NewLine;<li>Criminals can also attack business-critical devices connected to the Internet such as the monitoring systems on gas pumps&period; Using this connection&comma; the criminals could cause the pump to register incorrect levels&comma; creating either a false gas shortage or allowing a refueling vehicle to dangerously overfill the tanks&comma; creating a fire hazard&comma; or interrupt the connection to the point of sale system allowing fuel to be dispensed without registering a monetary transaction&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<h3><b>Consumer Protection and Defense Recommendations<&sol;b><&sol;h3>&NewLine;<ul>&NewLine;<li>Isolate IoT devices on their own protected networks&semi;<&sol;li>&NewLine;<li>Disable UPnP on routers&semi;<&sol;li>&NewLine;<li>Consider whether IoT devices are ideal for their intended purpose&semi;<&sol;li>&NewLine;<li>Purchase IoT devices from manufacturers with a track record of providing secure devices&semi;<&sol;li>&NewLine;<li>When available&comma; update IoT devices with security patches&semi;<&sol;li>&NewLine;<li>Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses&period; If a device comes with a default password or an open Wi-Fi connection&comma; consumers should change the password and only allow it operate on a home network with a secured Wi-Fi router&semi;<&sol;li>&NewLine;<li>Use current best practices when connecting IoT devices to wireless networks&comma; and when connecting remotely to an IoT device&semi;<&sol;li>&NewLine;<li>Patients should be informed about the capabilities of any medical devices prescribed for at-home use&period; If the device is capable of remote operation or transmission of data&comma; it could be a target for a malicious actor&semi;<&sol;li>&NewLine;<li>Ensure all default passwords are changed to strong passwords&period; Do not use the default password determined by the device manufacturer&period; Many default passwords can be easily located on the Internet&period; Do not use common words and simple phrases or passwords containing easily obtainable personal information&comma; such as important dates or names of children or pets&period; If the device does not allow the capability to change the access password&comma; ensure the device providing wireless Internet service has a strong password and uses strong encryption&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;ic3&period;gov&sol;media&sol;2015&sol;150910&period;aspx">Original PressReleases&&num;8230&semi;<&sol;a><&sol;p>&NewLine;

Cyber CrimeINTERNET OF THINGS