"Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"

Extended Internet of Things devices (xIoT) are attractive to cyberattackers aiming to move laterally within enterprise networks and establish persistence. Such devices have everything the bad guys need to gain a foothold as xIoT devices are significantly under-secured, present in large numbers, present in sensitive network areas, and are typically not well monitored. Brian Contos, a security researcher and strategist, explains that xIoT devices typically fall into three device categories that have all proliferated in business environments. The first category consists of enterprise IoT devices, such as cameras, printers, IP phones, and door locks. The second category consists of Operational Technology (OT) devices, such as industrial robots, valve controllers, and other digital equipment used to regulate physics in industrial settings. General network devices, such as switches, network-attached storage, and gateway routers, are the third and often the least-remembered category. Contos has explored how these devices can be used to launch massive attacks against enterprise resources, as well as what security strategists should do to mitigate the threat. This article continues to discuss the use of xIoT devices by attackers to establish persistence across networks and what enterprises should start doing about the risk. 

Dark Reading reports "Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"

 

Submitted by Anonymous on