IoT Botnets by the Numbers

IoT devices are a botherder's dream attack-vector.
IoT Botnet Controllers Double in 2017
Initial Mirai Attacks
Mirai Takes Down Dyn
Mirai Built Steam Last Year
Mirai Creators' Sentencing
Satori Skyrockets
Hide N Seek Finds Bots Quickly
Botnet for Rent
Enterprises Feel the Heat

Even before Mirai burst onto the scene a year-and-a-half ago, security experts had been warning anyone who listened about how juicy Internet of things (IoT) devices were looking to criminal botnet herders. Proliferating faster than black t-shirts at a security conference, IoT sensors have spread throughout our personal and business lives inside cameras, automobiles, TVs, refrigerators, wearable technology, and more.

They offer the perfect combination of variables for attackers seeking an ideal botnet node: ubiquity, connectivity, poor default settings, rampant software vulnerability - and utter forgetability. Once these devices are deployed, they're rarely patched or even monitored. So it was only a matter of time before cybercriminals started harvesting them for botnet operations.

Mirai offered one of the first large-scale implementations of IoT botnets, and since its inception in late 2016 the attacks have been relentless.

Here is a rundown of some of the most relevant stats around IoT botnet attacks.

Next slide
Recommended Reading: