Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / IoT is a gold mine for hackers using fileless malware for cyberattacks

IoT is a gold mine for hackers using fileless malware for cyberattacks

February 6, 2020 by cbn Leave a Comment

Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies.

In 2019, security teams made progress in the adoption of perimeter-less security while hackers increased the use of fileless malware and IoT malware.  

The 2020 SonicWall Cyber Threat Report highlights tactics hackers are using to get unauthorized access to data as well as what security teams are doing to protect it. The good news is that the researchers at SonicWall found that overall there was a 6% decrease in overall malware attacks in 2019, with 9.9 billion incidents reported, compared to 10.5 billion in 2010. 

The report also complied the worst data leaks of the year. IoT company Orbivo had the biggest data exposure which included two billion records. The company makes an all-in-one control panel for smart devices, a smart door lock, a light switch controller, and an air-conditioning control set. 

SEE: 5G: What it means for IoT (ZDNet/TechRepublic special feature) | Download the free PDF version (TechRepublic)

Biggest data losses

According to the report, Facebook was responsible for almost all the social media data losses while First American and Capital One breaches showed up in the banking category. Biometrics and security company Suprema lost control of 27 million records. 

The top 10 data exposures by industry, according to the SonicWall report were: 

  1. IoT, 2 billion records (1 breach)
  2. Social media, 1.4 billion records (7 breaches)
  3. Banking/credit/finance, 1.1 billion records  (4 breaches)
  4. Business, 984 million records  (4 breaches)
  5. Technology, 817 million records (4 breaches)
  6. Entertainment, 271 million records (3 breaches)
  7. Education, 139 million records (1 breach)
  8. Retail, 73 million from (2 breaches)
  9. Healthcare, 42 million records (7 breaches)

The SonicWall report described advances in perimeter-less security, a new way of thinking about how to keep threats out.

Now that the attack surface is expanding fast in every direction, companies should rethink defense strategies, according to SonicWall. This means taking a comprehensive approach to security instead of segmented one. 

SEE: How to get users on board with essential security measures (free PDF)

The report authors suggest that the zero-trust security model should evolve into a secure access service edge (SASE), a term that comes from the Gartner security analysts Neil MacDonald, Lawrence Orans and Joe Skorupa in 2019. A SASE platform will combine software- and service-based networks, which will unify separate security solutions.

The report authors state that this perimeter-less security movement could also replace VPNs and firewall technology to provide “greater network visibility, seamless onboarding, and full compatibility with all major cloud providers.”

On the offense side, hackers focused their efforts last year with these tools:

  • Encrypted threats
  • Fileless malware
  • IoT malware
  • Web app attacks

Here is a brief recap of each threat.                                                        

Fileless malware cyberattacks      

Fileless malware does not write its activity to the computer’s hard drive, making it hard for standard forensic strategies such as file-based whitelisting, signature detection, pattern-analysis and hardware verification to defend against it.

The most common fileless malware in 2019 were:

  • Astaroth Backdoor Trojan
  • Divergent
  • Icedld Banking Trojan
  • GandCrab Ransomware
  • Kovter
  • Noderosk
  • PCASTLE Monero-Mining Malware
  • Ursnif Banking Trojan

The report said that SonicWall researchers found that fileless malware incidents spiked from May to September but trailed off after that.

Encrypted threats

This type of attack is also good at slipping past traditional security defenses. Launching malware across encrypted traffic works for threat actors because many firewall appliances do not have the capability or processing power to responsibly detect, inspect and mitigate cyberattacks sent via HTTPS traffic.

In 2019, SonicWall Capture Labs threat researchers recorded 3.7 million malware attacks sent over transport layer security (TLS) and secure sockets layer (SSL) traffic, a 27.3% year-over-year increase. SonicWall predicts this attack vector will increase in the future.

IoT attacks

The SonicWall researchers found a 5% increase in IoT malware with 34.3 million attacks during 2019.

The report lists common IoT security weaknesses as weak or hard-coded passwords, insecure networks and interfaces, and lack of secure update mechanisms.

Check Point Research just announced a vulnerability in Philips Smart Hue lightbulbs. A flaw in the firmware allows attackers to take control of an individual bulb, push malicious firmware to it, and spread other malicious software throughout a network. The exploit comes from the Zigbee low-power IoT protocol used for device communication by Philips and many other IoT product manufacturers.
 
It seems obvious, but it’s worth repeating this observation from the report, “Given the tenuous landscape regarding data privacy, and the face that everything from nanny cams to doorbell are connected, IoT-focused attacks will only increase in 2020 and beyond.”

App attacks

For 2019, SonicWall Capture Labs threat researchers recorded a 52% year-over-year increase in web app attacks and found that the attacks are getting more sophisticated.

Volume was largely flat until May, but SonicWall recorded spikes in across the final seven months of year to push total web app attack volume past 40 million.

Currently, the top known web attacks include SQL injection, directory traversal, cross-site scripting (XSS), broken authentication and session management, cross-site request forgery (CSRF) security misconfigurations and sensitive data exposure.

SonicWall lists this as the top WAF Attacks in 2019:

  • Bash Code Injection
  • Blind SQL Injection Attack Variant 12
  • Cross-site Scripting (XSS) Attack
  • PHP NULL Poisoning
  • SQL Injection Attack 1
  • SQL Injection Attack 11
  • Unauthorized Remote File Access
  • Web Application Directory Traversal Attack 1
  • Web Application Directory Traversal Attack 5
  • Web Application Directory Traversal Attack 6

Many organizations are adding web application firewalls to their defenses to harden their overall security posture.

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Sign up today

Also see

Malware and hacking

Image: Getty Images/iStockphoto

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in