IoT News Weekly - May 27, 2022 - IoT Secure
I o S e c u r e ®

IoT News Weekly – May 27, 2022

IoT News Weekly – May 27, 2022

Brought to you by: IoT Secure

 

Benchmarking and market leader concept. Manager (businessman, coach, leadership) draw graph with three lines, one of them represent the best company in competition.
In this week’s IoT News: IoT Manufacturing is approaching a market cap of over a $200billion, Thales is making 5g connectivity easier for IoT, Malaysia is all-in on IoT and AI to help farmers, Russian Hackers are using IoT Botnets to spread disinformation, Researchers figured out how to get a Tesla for free (if your willing to steal it), IoT Devices are conscripted into a massive DDoS botnet, and finally today we’ll discuss how researchers at CMU want to help protect you from hidden cameras and devices.
IoT manufacturing estimates are todays first story. According to a new report from ResearchandMarkets.com IoT manufacturing is expected to grow to $200.3 billion by 2030. With the 2021 market estimated to be worth just over $62 billion the market for IoT manufacturing is expected to more than double by 2030.
Resource: https://www.prnewswire.com/news-releases/the-worldwide-iot-in-manufacturing-industry-is-expected-to-reach-200-3-billion-by-2030–301553101.html
smart city and wireless communication network, abstract image visual, internet of thingsIn other news IoT maker Thales announced a new 5G IoT modem that will make IoT connectivitiy simpler as well as allow networks to be spread across larger geographic areas without the need for internet or network connections. Thales has specifically designed their new card to make it simple for IoT manufacturers to incorporate 5G connectivity into their future IoT devices. Thales has also added robust networking and security features to their Cinterion MV32 5G cards that will help to protect and connect the next generation of IoT.
Source: https://www.businesswire.com/news/home/20220522005024/en/Innovative-IoT-Modem-Card-From-Thales-Makes-It-Easier-to-Build-a-5G-World-of-Trust
Kombain collects on the wheat crop. Agricultural machinery in the field. Grain harvest.
In Malaysia, the Technology and innovation minister, Dr. Adham Baba, announced a new program to help local farmers improve their yields with the assistance of Internet of Things and Artificial Intelligence technologies through collaborations with private and government agencies in the small country. Dr. Adham also went on to say that the ministry has plans around several technologies that farmers can use. With those that are related to climate independence of particular importance so that farmers can know what to do when farming during drought or excessively rainy seasons.
Source: https://www.thestar.com.my/news/nation/2022/05/24/use-iot-and-ai-to-improve-food-security-in-malaysia-says-dr-adham

In Hacker and Security related news the Russian IoT Botnet known as “Fronton” has proven to be a state-run campaign that is specifically designed to use infected IoT devices to run their social media disinformation campaigns. The existence of Fronton was known publicly in March of 2020 when a Russian hacker group who call themselves “Digital Revolution” released documents they claim to have obtained from an FSB subcractor, a company known as Zeroday Technologies.
Source: https://thehackernews.com/2022/05/fronton-russian-iot-botnet-designed-to.html
TESLA BLEIn other security news, Security Researchers at the NCC Group have developed a tool that is capable of performing a Bluetooth Low Energy (BLE) relay attack that can bypass existing protections in place to authenticate on target devices. BLE is used in many products today including Laptops, mobile phones, smartlocks, and access control systems of all kinds. Of particular interest is that the Tesla Model 3 and Tesla Model Y use this technology to unlock and start their cars. Security researchers at the NCC group developed a tool that let them bypass the authentication controls and with an unauthorized device unlock, start, and drive away in a Tesla.
Source: https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/
Abstract Internet BackgroundXorDDoS (zor de dos), a Linux based trojan-horse malware, has surged in popularity in the last six months. The malware is not necessarily new, as it was originally found in 2014. But according to  the Microsoft 365 Defender Team, they have seen a 254% increase in malicious activity against Linux-based endpoints, using the XorDDoS (zor de dos) malware, in the last six months. The malware is designed to quietly infect hosts running Linux, which includes the majority of IoT Devices. Infected endpoints will become part of the much larger botnet that is then used to perform distributed denial-of-service attacks.
Source: https://www.darkreading.com/cloud/linux-trojan-xorddos-attacks-cloud-iot
CCTV CameraFinally today, Secret and hidden cameras and unknown IoT devices collecting personal data has grown into a real problem today. A group of researchers at Carnegie Melon University created a new augmented reality app that works on any device with a camera to find and alert on any hidden cameras or other data-collecting devices in hotel rooms, AirBnBs, and other rentals. The system, which the researchers have dubbed Lumos, will let anyone find hidden devices before the devices have a chance to send data to snoopers.
Source: https://thehackernews.com/2022/05/lumos-system-can-find-hidden-cameras.html
Thank you for reading today, and don’t forget to watch weekly on our YouTube channel so you won’t miss our weekly IoT News updates.
If you’d like to learn more about IoT-secure and what we can do to help protect your network go to IoTsecure.io today.
Thank you and have a wonderful weekend!








get blog
updates











Get Blog Updates

Start your IoT Security Journey

Request a demo

Let our product experts show how IoT addresses you critical use cases.

Get a Demo

Request an Assessment

Get a no-obligation, free assessment for your business. identify assets and the risks they bring.

Get an Assessment

Get Blog Updates

 
 
 
 
 
 
 
 
 
 

submit your email to access the case study

    submit your email to access the case study

      submit the information below


        • For corporate networks only.
        • For registered companies with 100+ employees or that provide professional IT services.
        • Upon form submission, follow the prompts to schedule a 10-minute call to cover device set up and your shipping information.