Connected Home Appliances More Vulnerable to Hacker Attacks: Honeypots Test

IOT

IT security company Sophos said that appliances that are having connections with the Internet of Things are likely to have risks of being hacked / Photo by: Tumi-1983 via Wikimedia Commons

 

To celebrate World IoT Day, security firm Sophos laid out honeypots to test the durability or needed durability of connected IoT devices, as the future of the Internet of Things sees more and more connected home appliances. What they found was that as the connectedness grows, their risk from hackers also increases.

It was on Wednesday that Sophos initiated the study. As reported by LiveMint, Sophos wanted to use the honeypots to try and gather, over a one-month period, how well or how bad hacking will be on connected devices. Of the laid honeypots were collected “over 600,000 brute-force login attacks.”

Honeypots, as explained by the article, work like internal detection squads, which “alert a business or individual” about the appearance of a hacker or someone who might want to access information that is not as easily sourced. Some honeypots are of the low-interaction type, the ones which Sophos used, which only record hacking attacks and do not monitor their behavior. The high-interaction ones, for their part, are made to essentially follow a hacker around, allowing access and recording the behavior to get a read on the intentions behind the intrusion.

The honeypots were placed in 10 of the most popular Amazon Web Service (AWS) data centers in the world.

Additionally, most of the attacks were traced to China, but although that much is true, Sophos ruled out that it would be solely from Chinese hackers as attacks may still be routed through other machines if the hacker decides to do this.

What happens if the hackers figure out that there’s a honeypot? A Sophos report stated that because honeypots only represent a numeric value, they will appear to a hacker only as a number, “a bit of extra processing power that could be theirs, a camera they could control or a directory of files they could access and share.”