December 15, 2022
1 min read

India among top 3 countries originating IoT malware

It identified unpatched, high-severity vulnerabilities in 75 per cent of the most common industrial controllers in customer OT networks…reports Asian Lite News

India is among the top 3 countries originating Internet of Things (IoT) malware infection in 2022, a Microsoft report said on Wednesday.

IoT devices offer significant value to organisations in the country looking to modernise workspaces, become more data-driven and ease demands on staff through shifts like remote management and automation.

“Therefore, the cyber-threat landscape is real and security is the need of the hour. Microsoft aims to help incident responders and security specialists better understand their environments and prevent potential incidents,” said the tech giant.

The International Data Corporation (IDC) estimates there will be 41.6 billion connected IoT devices by 2025, a growth rate higher than traditional IT equipment.

With increasing connectivity across converging IT, Operational Technology (OT) and IoT, organisations and individuals need to rethink cyber risk impact and consequences, said the report.

Microsoft observed a spike in threats across traditional IT equipment, OT controllers and IoT devices like routers and cameras fueled by the interconnectivity many organisations have adopted over the past few years.

It identified unpatched, high-severity vulnerabilities in 75 per cent of the most common industrial controllers in customer OT networks.

“As OT systems underpinning energy, transportation, and other infrastructures become increasingly connected to IT systems, the risk of disruption and damage grows as boundaries blur between these formerly separated worlds,” said Vasu Jakkal, corporate vice president, security, compliance, identity, and management at Microsoft.

For businesses and infrastructure operators across industries, the defensive imperatives are gaining total visibility over connected systems and weighing evolving risks and dependencies, Jakkal added.

Modern threats like sophisticated malware, targeted attacks, and malicious insiders are difficult for traditional security measures to contain.

Microsoft also observed over 1 million connected devices publicly visible on the Internet running Boa, an outdated and unsupported software still widely used in IoT devices and software development kits (SDKs).

ALSO READ-Microsoft’s all-in-one ‘super app’ soon

Previous Story

Rashid Rover send first signal to UAE space centre

Next Story

Jaishankar slams China, Pakistan

Latest from India News

India Rejects Trump Mediation

He reaffirmed India’s openness to dialogue, but underscored that any talks must be grounded in seriousness and a clear commitment to ending cross-border terrorism In a firm rebuttal to former U.S. President

India Reaffirms Anti-Terror Stand

The delegation later called on former Japanese Prime Minister Yoshihide Suga, now Vice President of the ruling Liberal Democratic Party and Chairman of the Japan-India Association. Suga reiterated Japan’s firm backing for

UAE welcomes India’s all-party delegation

The United Arab Emirates is the first stop on this strategic tour, with the delegation engaging UAE leadership, parliamentarians, and media in a series of high-level meetings. In a significant diplomatic outreach,

Operation Sindoor: Indian MPs in Tokyo

Their visit marks the beginning of India’s unprecedented diplomatic campaign to expose Pakistan’s sustained role in cross-border terrorism…reports Asian Lite News An all-party parliamentary team led by JD(U) MP Sanjay Jha met

Tharoor carries Govt’s message to US

Congress MP Shashi Tharoor expresses his commitment to showcase India’s zero-tolerance stance against terrorism, emphasising that the mission transcends party politics and reflects national unity Congress MP Shashi Tharoor leads one of
Go toTop

Don't Miss

India experienced 7 lakh malware attacks in 2022

In 2021, the top three sectors affected by ransomware were

New malware targeting Android users to steal sensitive data using OCR

The malicious apps are distributed through a variety of channels,