t cht lk
“
ONCE AN
ATTACK HAS GOT
UNDERWAY, IT
CAN BE DIFFICULT
TO DETECT.
96
INTELLIGENTCIO
This large distributed, network of computers,
under the control of threat actors, represents
an aggregation of computing power that
can be used for a devastating effect.
Inside the network
Malicious software designed to exploit
IoT devices is usually not sophisticated. It
operates by scanning network ports, looking
for access opportunities, and gaining access
through default credentials, or brute-force
hacking to gain access. This software is much
easier to defend against, as it merely requires
configuring the network firewall protection
devices. Like other malware, botnets can
enter an organisation through multiple points
of entry. This includes email attachments,
hacked web sites, connected sensors and
other IoT devices, and USB sticks.
Once malicious software has entered an
organisation, it will call home – the hackers
command and control server – to register
www.intelligentcio.com