• About
  • Advertise
  • Contact
Monday, November 10, 2025
No Result
View All Result
NEWSLETTER
iottennessee
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
No Result
View All Result
iottennessee
No Result
View All Result
Home Internet of Things

Microsoft finds Russia-backed attacks that exploit IoT devices

in Internet of Things
0
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT-based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday.

Microsoft said in a blog that the attack, which it discovered in April, targeted three specific IoT devices – a VoIP phone, a video decoder and a printer (the company declined to specify the brands) – and used them to gain access to unspecified corporate networks. Two of the devices were compromised because nobody had changed the manufacturer’s default password, and the other one hadn’t had the latest security patch applied.

Devices compromised in this way acted as back doors to secured networks, allowing the attackers to freely scan those networks for further vulnerabilities, access additional systems, and gain more and more information. The attackers were also seen investigating administrative groups on compromised networks, in an attempt to gain still more access, as well as analyzing local subnet traffic for additional data.

STRONTIUM, which has also been referred to as Fancy Bear, Pawn Storm, Sofacy and APT28, is thought to be behind a host of malicious cyber-activity undertaken on behalf of the Russian government, including the 2016 hack of the Democratic National Committee, attacks on the World Anti-Doping Agency, the targeting of journalists investigating the shoot-down of Malaysia Airlines Flight 17 over Ukraine, sending death threats to the wives of U.S. military personnel under a false flag and much more.

According to an indictment released in July 2018 by the office of Special Counsel Robert Mueller, the architects of the STRONTIUM attacks are a group of Russian military officers, all of whom are wanted by the FBI in connection with

Download WordPress Themes
Download WordPress Themes Free
Download Nulled WordPress Themes
Free Download WordPress Themes
udemy free download
download mobile firmware
Download WordPress Themes
udemy paid course free download
Next Post

Wi-Fi has the best security for the IoT

Recommended

FBI access to surveillance program expands in recent years

Edge computing: When to outsource, when to DIY

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Hardware
  • Infrastructure
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • Open Source
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2019-20 iottennessee.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware

© 2019-20 iottennessee.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In