According to the blog post, a Russian state-sponsored group has attacked IoT devices called STRONTIUM.
[Research related to Microsoft researchers
They threaten the information center
Researchers in April
They get familiar hostile infrastructure that deals with different people
Unique experiments to make external devices popular IoT scandal
Multiple devices (VOIP phones, office printers and video decoders)
Customers, Security from Microsoft
Response center inspected.
The investigation revealed that the actor used tools to track it down
First access to corporate networks, and password on two occasions
They were sent with the car manufacturer’s password and changed to a third party
For example, the latest security update feature may not work on your device.
Customers have used one tool
Availability of networks: Additional access is required. If the hero succeeds
Network configuration, easy network scanning
Unofficial devices allow you to search, search and browse the network
Successful accounts can access high quality data,
When it comes to IoT devices, I am
Hackers are rantcapdampto snaf network
The procession passed through underground mining and management teams
Try to identify abuses, the least you can say
The network moves from one device to another.
The device also has connectors
Remote server command (C2).
But Microsoft researchers deserve it
The attacks are attributed to the strategy because the definition has begun.
Of course, they cannot set strategic goals
The goal is offensive.
According to the organization, Steve Darby was the executive director of the Information Security Forum
Choose smart devices enthusiastically, you do not know these devices
In general, the design is harmless, giving attackers more options.
Names and codes are sent by most users of IoT devices
Constitutional and security plan with a long history that has not been updated before
According to developers: Chris Morals,
Director of Vectra Security Analysis. The IoT device is too small to access
Do not follow rules or safety instructions.
Therefore, the tool was developed independently of security.
But cheap data provision and storage,
Take the risk if you endanger the company. open
When people connect to a computer at home, it can be a device
The manager connects to the network, which triggers attacks on the site
Its bad not to use the homeowner, he said.
Except for that
The username and password are assigned to many IoT devices
Companies that never update, submit, or maintain programs
According to producers Chris Morales
Vectra Security Analyzer. IoT devices are impossible to use
How safe they are without rules and instructions.
As a last resort
According to a recent Microsoft report, it displays IoT performance and attacks.
Long and true. Multiple DDoS attacks, original testing
Its hard to deal with the worlds greatest tangible objects, even the worlds most prepared
The key company to be a good network citizen (exchange)
Clothing!), But most importantly: dont take the camera.
Research on IoT devices poses a significant risk
This can be seen in key corporate networks and systems.
Microsoft Search Report with Publishers, Cameras, and IoT Web Tools
Even modern MRI scanners provide poor internet security