Our modern world depends on healthy, functioning, IoT devices; however, many of them are unsecure. Cyber attackers have compromised IoT devices for over a decade, turning them into Thingbots―botnets made from IoT devices.
The hunt for IoT attacks has made a pivotal turn in the last two and a half years. F5 Labs has been tracking these attacks and the subsequent building of Thingbots from boutique attacks, into more sophisticated and powerful cyber weapons. Thingbots are now being sold as multi-vector bots-for-hire that allow cyber attackers to launch any attack of their choice―often used for automated web application attacks and credential stuffing.
With the threat of IoT attacks increasing, as billions of new devices are deployed each year, the ability to detect threats, and clean and upgrade infected systems is still not a part of most IoT development processes.
In this webinar we’ll explore:
- How attacks have evolved from the methods they use to the attacks they launch from the resulting Thingbots
- The threat actor networks and IPs behind these attacks, their geographical targets, and how that has changed over time
- What you should do to protect your company