Sunday, September 27, 18:26
Home security IoT: New cyberattacks on gas pumps from Dark Web hackers!

IoT: New cyberattacks on gas pumps from Dark Web hackers!

IoT-connected devices (Internet of Things), increase rapidly, resulting in Cybercriminals to focus more on them. The reason; IoT products are constantly proliferating and as they are connected to each other, when a device becomes a hacker target they can easily be affected.

 and production

And while routers have been and continue to be the main target for IoT cyberattacks, Internet forums are increasingly being discussed on Dark Web forums.

This revelation was made by her researchers Trend Micro, who researched the Dark Web online marketplaces in five different languages: Russian, Portuguese, English, Arabic, and Spanish.

The conclusion from a study on IoT cyberattacks, is that the Russian market is by far the most sophisticated in underground communities but also the one that will generate the most revenue through exploits. Russian government legislation requires all electric meters in the country to be replaced with smart meters. So, hackers can easily modify it firmware of these devices and sell them to unsuspecting users. It has been observed that smart meter modifications are made in such a way that they record less, resulting in a smaller end-user account. However, many are now looking to Russian Dark Web, information and ways to crack their gas pumps.

 and production

The reasons for these attacks are often for good reason, as ordinary citizens' expenses are reduced. However, it is not at all unlikely that the hacking of gas pumps can cause catastrophic results. They could, for example, be used for DDoS(Distributed Denial of Service) attacks. A previous Trend Micro report demonstrates that remote and unsecured gas pumps can be used by hackers for greater physical damage.

Of course, there is a way to protect the gas pumps and their counterparts from hacking attacks. Operators of these devices should consider using it VPN for encryption and mutual authentication for both the device and the user. Finally, often updates and its fixes software they are necessary.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

SecNews
SecNewshttps://www.secnews.gr
In a world without fences and walls, who needs Gates and Windows

LIVE NEWS

How to perform actions by tapping on the back of your Android phone

Gestures and shortcuts allow you to quickly access things without having to go through apps and menus. What's up...

iOS 14: The long-awaited new features!

The annual Apple iPhone update, iOS 14, is here, and in addition to the new privacy and security features there are many more.

Business - COVID-19: Storage in the cloud VS data centers!

The COVID-19 pandemic has changed the data for companies worldwide, with the result that they have to change both ...

How to use the Apple Translate App on your iPhone?

Apple's Translate app, introduced in iOS 14, allows iPhone users to do ...

How to turn off private Wi-Fi MAC addresses

Apple has changed the way the iPhone and iPad connect to Wi-Fi networks starting with the iOS 14 and iPadOS 14 updates ....

Mac: See how to rename multiple files at once!

Many people have more difficulty renaming files on a Mac than renaming Windows. The Finder of ...

How can you control the performance of your Chromebook?

Many times users wonder about the performance of their computer and would like to be able to take a look at the system ...

How To Detect Hidden Surveillance Cameras With Your Phone

During our holidays or on business trips, we are forced to stay in hotels or Airbnb ....

How to play the hidden game of Android 11

Google usually includes the so-called "Easter Eggs" in every new version of Android that is released. And Android 11 is not ...
00:01:49

Ring: Amazon's new device is a drone with a security camera

Amazon is ready to launch a new Ring security camera mounted on top of a flying drone.