With the increase in global trust in the internet, Internet of Things devices are also making their way into all facets of our daily lives. In fact, it is thought that by 2025 there will be up to 75 billion IoT devices connected to the internet. Unfortunately, the security and integrity of these devices is still very neglected and there are more and more cases of devices hacked and used as part of a botnet that is why IoT attacks can become a very serious problem. Now we will see some examples of the most prominent attacks using IoT devices:

▸The attack on an Iranian nuclear plant

The obligatory reference to Stuxnet, the computer worm considered to be the first to attack industrial control systems (SCADA). Supposedly created to sabotage the uranium enrichment processes of the Iranian nuclear program, it is estimated that it destroyed up to a thousand centrifuges before being discovered.

▸Theft of information from plans and electrical stations

In 2013, the theft of information from detailed plans of the network and 71 electrical stations, precise location of devices, network diagrams and passwords of devices of the electrical network managed by the Calpine company, the main electricity generator of the United States, was confirmed. United States. Relevant information that facilitates the execution of a subsequent attack.

▸Attacks on building ventilation and air conditioning systems

In 2012, a group of attackers managed to remotely manipulate the thermostats of a government building and a manufacturing plant to successfully change the temperature inside. If it had occurred in a data center, for example, it could have caused damage to the IT infrastructure.

▸Attack on oil platforms and maritime navigation systems

A 2014 Reuters article reported that an attacker managed to tip an oil rig off the African coast, causing its systems to shut down. The same text indicates that there are suspicions that Somali pirates have access to the location information of cargo ships, so the crew often turn off their navigation systems or falsify the location data to make it appear that they are in another side when they go through risky areas or controlled by pirates.

Related reads:
IoT Botnet Attacks – A problem for Cybersecurity
Edge Computing – What is this technology
IoT – Also known as Internet of Things


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *