Proofpoint Uncovers Internet of Things (IoT) Cyberattack

Similar documents
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

The Economist's Corner. Latest News

Malware & Botnets. Botnets

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Internet threats: steps to security for your small business

How To Protect Your Online Banking From Fraud

2012 Endpoint Security Best Practices Survey

The Internet of Things (IoT) Opportunities and Risks

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Marble & MobileIron Mobile App Risk Mitigation

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Addressing Legal Discovery & Compliance Requirements

Top 10 Tips to Keep Your Small Business Safe

Reducing the cost and complexity of endpoint management

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Proofpoint Partner Program

SPEAR PHISHING AN ENTRY POINT FOR APTS

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Connected Intelligence and the 21 st Century Digital Enterprise

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

IBM Security Strategy

Impact of Data Breaches

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

INTRODUCING isheriff CLOUD SECURITY

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Cyber-Security Risk in the Global Organization:

Securing Corporate on Personal Mobile Devices

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Perspectives on Cybersecurity in Healthcare June 2015

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Better Together: Microsoft Office 365 & Symantec Office 365

Finding Security in the Cloud

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Top five strategies for combating modern threats Is anti-virus dead?

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

ALERT LOGIC FOR HIPAA COMPLIANCE

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Spear Phishing Attacks Why They are Successful and How to Stop Them

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Securing Your Business s Bank Account

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Fighting Advanced Threats

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

IPLocks Vulnerability Assessment: A Database Assessment Solution

Wireless Security Strategies for ac and the Internet of Things

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

POLICIES TO MITIGATE CYBER RISK

Stop DDoS Attacks in Minutes

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

NATIONAL CYBER SECURITY AWARENESS MONTH

WHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY

Securing Office 365 with Symantec

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Managing Security Risks in Modern IT Networks

INFORMATION PROTECTED

PCI Compliance for Healthcare

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

What is Really Needed to Secure the Internet of Things?

KEY STEPS FOLLOWING A DATA BREACH

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Kaspersky Security for Mobile

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

Transcription:

Proofpoint Uncovers Internet of Things (IoT) Cyberattack Page 7 of 11

By Published: Jan 16, 2014 12:30 p.m. ET 217 28 49 More Than 750,000 Phishing and SPAM Emails Launched From "Thingbots" Including Televisions, Fridge SUNNYVALE, CA, Jan 16, 2014 (Marketwired via COMTEX) -- Proofpoint, Inc., PFPT, -1.60% a leading security-as-a-service provider, has uncovered what may be the first proven Internet of Things (IoT)-based cyberattack involving conventional household "smart" appliances. The global attack campaign involved more than 750,000 malicious email communications coming from more than 100,000 everyday consumer gadgets such as home-networking routers, connected multi-media centers, televisions and at least one refrigerator that had been compromised and used as a platform to launch attacks. As the number of such connected devices is expected to grow to more than four times the number of connected computers in the next few years according to media reports, proof of an IoT-based attack has significant security implications for device owners and Enterprise targets. Just as personal computers can be unknowingly compromised to form robot-like "botnets" that can be used to launch largescale cyberattacks, Proofpoint's findings reveal that cyber criminals have begun to commandeer home routers, smart appliances and other components of the Internet of Things and transform them into "thingbots" to carry out the same type of malicious activity. Cyber criminals intent on stealing individual identities and infiltrating enterprise IT systems have found a target-rich environment in these poorly protected internet connected devices that may be more attractive and easier to infect and control than PC, laptops, or tablets. The attack that Proofpoint observed and profiled occurred between December 23, 2013 and January 6, 2014, and featured waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting Enterprises and individuals worldwide. More than 25 percent of the volume was sent by things that were not conventional laptops, desktop computers or mobile devices; instead, the emails were sent by everyday consumer gadgets such as compromised home-networking routers, connected multi-media centers, televisions and at least one refrigerator. No more than 10 emails were initiated from any single IP address, making the attack difficult to block based on location -- and in many cases, the devices had not been subject to a sophisticated compromise; instead, misconfiguration and the use of default passwords left the devices completely exposed on public networks, available for takeover and use. "Bot-nets are already a major security concern and the emergence of thingbots may make the situation much worse," said David Knight, General Manager of Proofpoint's Information Security division. "Many of these devices are poorly protected at best and consumers have virtually no way to detect or fix infections when they do occur. Enterprises may find distributed attacks increasing as more and more of these devices come on-line and attackers find additional ways to exploit them." While IT experts have long predicted security risks associated with the rapidly proliferating Internet of Things (IoT), this is the first time the industry has reported actual proof of such a cyber attack involving common appliances -- but it likely will not be the last example of an IoT attack. IoT includes every device that is connected to the internet -- from home automation products including smart thermostats, security cameras, refrigerators, microwaves, home entertainment devices like TVs, gaming consoles to smart retail shelves that know when they need replenishing and industrial machinery -- and the number of IoT devices is growing enormously. IDC predicts that more than 200 billion things will be connected via the Internet by 2020(1). But IoT devices are typically not protected by the anti-spam and anti-virus infrastructures available to organizations and individual consumers, nor are they routinely monitored by dedicated IT teams or alerting software to receive patches to address new security issues as they arise. The result is that Enterprises can't expect IoT-based attacks to be resolved at the source; instead, preparations must be made for the inevitable increase in highly distributed attacks, phish in employee inboxes, and clicks on malicious links. Page 8 of 11

"The 'Internet of Things' holds great promise for enabling control of all of the gadgets that we use on a daily basis. It also holds great promise for cybercriminals who can use our homes' routers, televisions, refrigerators and other Internet-connected devices to launch large and distributed attacks," said Michael Osterman, principal analyst at Osterman Research. "Internetenabled devices represent an enormous threat because they are easy to penetrate, consumers have little incentive to make them more secure, the rapidly growing number of devices can send malicious content almost undetected, few vendors are taking steps to protect against this threat, and the existing security model simply won't work to solve the problem." About Proofpoint, Inc. Proofpoint Inc. PFPT, -1.60% is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com. Proofpoint is a trademark of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners. (1) [source: http://www.zdnet.com/internet-of-things-8-9-trillion-market-in-2020-212-billion-connected-things-7000021516/] Media Contact: Orlando Debruce Proofpoint, Inc. 408-338-6829 Email Contact Sarmishta Ramesh Ogilvy Public Relations 303-527-4615 Email Contact SOURCE: Proofpoint (C) 2014 Marketwire L.P. All rights reserved. The MarketWatch News Department was not involved in the creation of the content. STOCK REFERENCES Sponsored by PFPT -0.90-1.60% PFPT -0.90-1.60% MORE NEWS FROM & Top Stories Trending Recommended Here s why oil is rallying to its highest level this year Page 9 of 11

So far cheap oil hurting economy more than it s helping Dollar rises off lows on early glimpse of a second-quarter rebound Here are the boxers to follow after the Mayweather-Pacquiao fight How Ben Bernanke let down America PARTNER CENTER CONTENT FROM OUR SPONSORS 8 Cleaning Tricks Pet Owners Often Forget Vetstreet Meet GE's lovely and sleek Profile induction CNET 5 Uses For Microwaves We Can't Believe We ULIVE Cut The Cable Without Missing Out With a Crutchfield.com Page 10 of 11

Recommended by SPONSORED LISTINGS 1 Top 5 Retirement Funds 3 Best Retirement Investments 5 Self-Directed 401K Plans 2 Invest in Index 4 Best Investment 6 Penny Stock Funds Options Trading MORE HEADLINES Salesforce s likeliest suitors: Oracle, H-P, IBM, Microsoft MarketWatch How Wearables Might Affect The Future Of The Insurance Claims Process PwC Digital Services 10 Largest Financial Frauds Of All Time LOLWOT US Drivers Hit With A Big Surprise DailyInsight How Ben Bernanke let down America MarketWatch Recommended by Site Index COMPANY Company Info DOW JONES NETWORK WSJ.com Back to Top Topics Code of Conduct Barron's Online Help Corrections BigCharts Feedback Advertising Media Kit Virtual Stock Exchange Newsroom Roster Advertise Locally Financial News Online Media Archive License our Content WSJ.com Small Business Premium Products Broker Center realtor.com Mobile Your Ad Choices Copyright 2015 MarketWatch, Inc. All rights reserved. By using this site you agree to the Terms of Service, Privacy Policy, and Cookie Policy. Intraday Data provided by SIX Financial Information and subject to terms of use. Historical and current end-of-day data provided by SIX Financial Information. Intraday data delayed per exchange requirements. S&P/Dow Jones Indices (SM) from Dow Jones & Company, Inc. All quotes are in local exchange time. Real time last sale data provided by NASDAQ. More information on NASDAQ traded symbols and their current financial status. Intraday data delayed 15 minutes for Nasdaq, and 20 minutes for other exchanges. S&P/Dow Jones Indices (SM) from Dow Jones & Company, Inc. SEHK intraday data is provided by SIX Financial Information and is at least 60-minutes delayed. All quotes are in local exchange time. Page 11 of 11