IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications

Introduction: Manufacturers Favor Convenience over

Because IoT security is still an afterthought, cybercriminals in general consider smart devices a “low-hanging fruit” – a target easy to compromise and manipulate.

Security (and privacy) by design is key for IoT, and probably the only effective way for a smart gadget to protect its communications is to encrypt them. Unfortunately, it is still not easy to reconcile convenience with security when it comes to low-resource apparatuses. For that reason alone, many IoT products come with either ineffective features that encrypt communications and stored or none at all.

According to a 2020 report by a threat intelligence team called Unit 42, 98% of the 1.2 million IoT devices on corporate networks they analyzed had no capability to encrypt traffic. As a result, 57% of these IoT devices were susceptible to traffic interception and manipulation, among other things. The same report further showed that mixing IoT and IT assets on VLAN may be dangerous, as compromised employee IoT devices could spread onto corporate networks.

Aamir Lakhani, researcher and practitioner at FortiGuard Labs, explains the whole production conundrum surrounding smart things before Dark Reading:

“Designing a device that is easy

Read More: https://resources.infosecinstitute.com/topic/iot-security-fundamentals-intercepting-and-manipulating-wireless-communications/