Cybersecurity risks of unsupported IoT devices

Zachary Amos, Features Editor of ReHack Magazine runs through the major risks posed by unsupported IoT devices

Zachary Amos, Features Editor of ReHack Magazine runs through the major risks posed by unsupported IoT devices

The Internet of Things (IoT) has introduced unparalleled conveniences into society. Its data-collection abilities are remarkable, but the depth of its insights is also a cybersecurity risk. When people throw away their smart devices like watches, light bulbs and personal medical items, they open back doors for hackers in surprising ways. Here is what manufacturers and users can do to protect outdated IoT products after their disposal.

Lack of security updates

Companies stop supporting devices when they reach end-of-life stages. Even if the item is still operable, sunsetting services could mean it stops receiving updates that keep it safe from modern cyberthreats.

Suddenly, countless IoT devices are vulnerable to new exploits. The number of IoT endpoints was estimated at 14.5 billion by the end of 2022, clarifying how many millions could go into landfills or become defunct yearly. These are the best options for staying safe.

What manufacturers can doWhat users can do
Outline support life cycles for users at point of saleResearch or contact the manufacturer to determine cybersecurity reputation
Have an optional extended security support programmeSeparate IoT devices from personal networks and accounts at end of life
Educate customers on how to decommission devices before discardingReplace products with supported models

Reliance on default credentials

When someone receives new tech, they are excited to get it up and running. They may speed through the setup, neglecting to finagle with settings in too much detail. The hype can lead to oversights, as many machines have factory-assigned usernames and passwords. These are searchable online, making them easy to access without requiring high-level skills. Here is how to overcome them.

What manufacturers can doWhat users can do
Force users to set new usernames and passwords during setupUse unique logins and passwords for each device according to industry recommendations
Include other authentication protections like biometricsSet reminders to change passwords regularly
Ensure credentials are not searchable online and only obtained through customer supportEducate friends and family to do the same

Unsecured communications

As more people started working from home, they used their own devices and installed shadow IT. Including IoT in the mix can cause more problems. Incidents have risen around 23% since the work-from-home revolution, with some businesses stating attacks have doubled.

Even for personal use, the IoT is straightforward enough to intercept and start eavesdropping on a conversation or redirect data transmission. This is all possible even after a device has been discontinued.

What manufacturers can doWhat users can do
Employ strong encryption protocolsDo not connect to open networks
Address vulnerabilities in communications through frequent updatesUse a virtual private network to encrypt activity
Inform customers of the risks associated with connecting to unfamiliar networksChange settings to only connect to the most secure protocols

Vulnerable software components

Hackers know what operating systems and software IoT devices use — they keep track of them and how well-defended they are. Once planned obsolescence hits a line of products, they compromise any of these components with outstanding vulnerabilities. Customers may trust manufacturers for longer than the software is functional. However, a few actions go a long way in making them inaccessible to cybercriminals.

What manufacturers can doWhat users can do
Audit software components regularly, including devices about to go out of serviceInstall firmware and software updates, including before disposal if possible
Create an easy-to-use tool for customers to check for official updates even after the end-of-life dateIsolate devices from the Internet

Recruitment for botnets

Botnet attacks are becoming more common, and it might be because it is easy to hijack stray IoT devices — even children can develop the necessary skills. Once threat actors secure enough devices in the botnet, they can launch distributed denial-of-service (DDoS) attacks and spread malware. Research shows the trend increased by 35% in 2021 alone. Prevent it from rising further.

What manufacturers can doWhat users can do
Incorporate defences targeted against botnetsMonitor network activity and device behaviour for anomalies
Stay informed about botnet and DDoS trends to develop new strategiesRestrict access with cyber hygiene practices like using strong passwords and firewalls
Recommend intrusion detection systems for customersDestroy or dismantle equipment after use and send it to recycling to prevent unauthorised access

Securing the IoT for its entire life cycle

An old smart doorbell or camera should not remain a security concern at the end of its life. Manufacturers and consumers can work together to eliminate these issues by raising awareness of how dangerous it is to let devices go unsupported while connected. Eventually, the future of the IoT will be behind nearly impenetrable walls, even when a customer upgrades to a new model.

Zac Amos is a freelance tech writer who specialises in IoT, cybersecurity, and automation. He is also the Features Editor at ReHack Magazine. Follow him on LinkedIn.

There’s plenty of other editorial on our sister site, Electronic Specifier! Or you can always join in the conversation by commenting below or visiting our LinkedIn page.

Exit mobile version