The immense connectivity in which we live, despite bringing many advantages, also carries some associated risks. They are convenient solutions that materialize in the communication between several devices and in the Internet connection of several products.
The alert is given by Check Point, an entity specialized in cybersecurity solutions worldwide, which warns especially for the Ransomware of Things. Something that can affect even home appliances with a web connection, and various gadgets.
The danger posed by the Ransomware of Things
It’s an evolution of malicious software that, instead of stealing sensitive information from a particular company, takes control of all devices connected to the internet. Thus, preventing the user from using them until payment of a ransom.
Although it is already well known, ransomware remains a current threat. According to Check Point, this type of cyber attack grew 160% in the third quarter of last year.
This means that, on average, 8% of businesses suffer an attack every week. It is therefore understandable why the Cyber Security Report 2020 indicates targeted ransomware as one of the biggest threats identified.
“While information remains the primary focus of cyber attackers as a means of obtaining a rescue, it is increasingly common for these attacks to focus on all types of devices, not just computers. With this, the threat is amplified, since the risk stops targeting only companies, reaching the whole society ”, says Mario García, General Director of Check Point Spain and UK.
How does RoT work? The main danger is Jackware
Internet of Things devices have been gradually entering our reality.
However, there is a long way to go in order to ensure that technological advances are accompanied by appropriate cybersecurity measures.
Attacks that target IoT devices take place in a manner similar to traditional threats, with the main difference that their focus is on blocking devices rather than data.
As a rule, a virus called “jackware” is used. This is malicious software that tries to take control of devices connected to the internet whose function is not to process data.
This means that, for example, in a domestic environment, a cybercriminal could manipulate all types of connected appliances. In fact, in more advanced cases, essential resources such as electricity, water or home control of the residence.
The risks increase when considering, for example, the advances that the road industry has achieved. More specifically, with regard to the number of cars connected to the Internet globally.
It is estimated that, in 2023, the market for advanced driver assistance systems (ADAS) will grow by around 32 billion euros. More and more the functionalities of a car can be controlled via mobile application, such as opening and closing the vehicle or starting the engine.
In this case, taking control of a smartphone, an attacker could therefore control the victim’s car.
“The new generations of cyber threats are notable for being very sophisticated, but also for using old resources, such as ransomware, in an innovative way to bypass traditional security measures. Ransomware of Things is a clear example: cyber-attackers, taking advantage of the fact that connectivity is the engine of the world, direct their attacks on poorly protected mobile devices. As technology is advancing at a rapid pace, it is essential to adopt security measures focused on preventing risks and threats before they materialize. There are no second chances in cybersecurity. It is very important that we are protected from the first moment with the most advanced technological solutions, ”concludes Garcia.
4gnews editors recommend:
*The article has been translated based on the content of https://4gnews.pt/ransomware-of-things-os-principais-riscos-e-metodo-de-ataque/ by 4gnews.pt
. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!
*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.
*We always respect the copyright of the content of the author and always include the original link of the source article. If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!