Add to favourites
News Local and Global in your language
11th of December 2018


Top IoT protocols hide security risks

‘Major design flaws’ and ‘vulnerable implementations’ have been discovered by security researchers in two popular machine-to-machine (M2M) protocols, Trend Micro announced this Wednesday.

Researchers have been scrutinising the protocols Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) for four months, and had found more than 200 million MQTT messages and more than 19 million CoAP messages being leaked by exposed brokers and servers.

Hackers could locate leaked information through keyword search, finding ‘lucrative information’ on assets, personnel and technology. Potential attackers could also remotely control IoT endpoints and deny service, as well as maintain ‘persistent access’ to a target, to move laterally across the network.

“The issues we’ve uncovered in two of the most pervasive messaging protocols used by IoT devices today should be cause for organisations to take a serious, holistic look at the security of their OT environments,” said Greg Young, vice president of cybersecurity for Trend Micro. “These protocols weren’t designed with security in mind, but are found in an increasingly wide range of mission critical environments and use cases. This represents a major cybersecurity risk. Hackers with even modest resources could exploit these design flaws and vulnerabilities to conduct reconnaissance, lateral movement, covert data theft and denial-of-service attacks.”

Trend Micro says there are four things organisations can do to protect themselves:

Implement proper policies to remove unnecessary M2M servicesRun periodic checks using internet-wide scanning services to ensure sensitive data is not leaking through public IoT servicesImplement a vulnerability management workflow or other means to secure the supply chainStay up to date with industry standards as this technology is evolving rapidly

Image Credit: Melpomene / Shutterstock

Read More

Leave A Comment

More News

Latest ITProPortal news

ExtremeTech » Internet

TechRadar: Internet news

TechCrunch » Enterprise

Digital Trends

Disclaimer and is not the owner of these news or any information published on this site.