Bad actors are busy at work deploying zero-day exploits at a rapid pace.
The most recent ransomware attack targeted a previously unknown vulnerability in a Mitel business phone device. They seek out any vulnerability in a system that is usually unknown to the business owner and then use those newly found vulnerabilities to execute a targeted attack.
The recent intrusion of a Mitel VoIP device acted as an entry point to achieve remote code execution in order to gain access to the environment and from there the possibilities for taking control of other IoT appliances are endless. CrowdStrike, a cybersecurity firm, traced the source of the attack to a Linux-based Mitel VoIP device on a vulnerable network. While Mitel did fix the vulnerability with a patch very quickly, it was rated 9.8 out of 10 for severity on the CVSS vulnerability scoring system, making their shortcoming critical in nature.
Poorly secure computers and VoIP phone systems are only the beginning of the list of devices that are vulnerable to attacks. Any device that connects to the IoT (internet of things) can be exploited by even the least experienced hacker. Networks with limited security safeguards are an easy target that leaves your business in jeopardy of becoming their next victim.
If you are a business owner, you should be asking yourself these questions right now:
- Do you know your vulnerabilities?
- Do you have an incident response plan in place?
- Is your business truly protected?