The threat of IoT botnets was realized in 2016 and popularized by Mirai, according to a study by Neustar.
Mirai and similar types of malware compromise IoT device credentials to enrol them into botnets, which are activated by command and control servers.
As these code assemblies are published, new developments continue to emerge, such as persistent device enrolment, which enables botnet operators to maintain control of a device even after it is rebooted.
The study also reported that the frequency of DDoS attack mitigations by the company increased 40% in 2016 compared to the same period of time in 2015, according to a study released by the company.
“With DDoS attacks predicted to become even more complex and ferocious in 2017, increasingly digital organizations within Asia-Pacific will be exposed to more frequent and severe cyber-attacks,” said Robin Schmitt, general manager for APAC at Neustar.
Multi-vector attacks, which combine attack vectors to confuse defenders and supplement attack volume, also increased 322% and accounted for 52% of the attacks mitigated by Neustar. UDP, TCP and ICMP comprise the three most popular attack vectors, which were leveraged in more than 50% of attacks.
The report also showed that DNS-based attacks increased 648% with many attackers leveraging DNSSEC amplification to generate massive volumetric pressure.