IoT Exploitation Forensic Analysis

By Kevin Lanier on April 4, 2025

Executive Summary

Internet of Things (IoT) devices are vulnerable to attacks due to weak authentication, outdated firmware, and unsecured network access. These devices can be hijacked to steal sensitive information, become botnets and even cause physical harm to the owner. Exploitation of these devices can be mitigated with strong authentication, regular firmware updates, network segmentation, and real-time monitoring. The best practice is to follow a zero-trust model, enforce least privilege access, and continuously audit for vulnerabilities. By prioritizing security whenever possible in regard to IoT devices, users and organizations can mitigate IoT risks and ensure a resilient network.

Background

The Internet of Things (IoT) refers to a network of devices that exchange data with one another onto a cloud service [8]. These machines range from everyday household items such as electronic doorbells and thermostats to complex industrial tools like programmable logic controllers. The appliances will exchange data between one another to perform in the most optimal fashion for the owner. For example, a smart thermostat will automatically adjust itself based on the temperature outside and the user’s preference. Smart blinds will have this data communicated to them and then close decisively for the sake of regulating the amount of heat and sunlight entering the user’s home [5].

IoT devices are susceptible to a variety of attacks due to the very nature of how they exchange data. They often have limited computational abilities and hardware constraints, which prevent the implementation of robust security measures such as encryption and comprehensive access controls. For instance, many IoT devices lack the capability to securely transfer data between servers, leaving sensitive information vulnerable to interception [1]. Additionally, because of the nature of IoT devices, they’re frequently sharing data with one another over their shared network and uploading that data to a server hosted by the manufacturer. This means that hackers can use a single compromised machine as a backdoor to access all of the other devices on its home network.

Impact

IoT devices have been exploited by cybercriminals for over a decade. The earliest documented exploitation of an IoT device dates back to 2015, when security researchers Charlie Miller and Chris Valasek remotely hacked a 2014 Jeep Cherokee [3]. They accessed the vehicle’s Uconnect infotainment system via its cellular connection, enabling them to control critical functions such as steering, braking, and transmission. The exploit impacted a staggering 1.4 million Jeep Cherokees, but the most concerning thing is the potential for harm that it had. If cybercriminals discovered this exploit before the security researchers, there would have been a potential for car owners and bystanders to be trapped, injured or killed from hackers working on the back-end. 

Since then, there have been many exploits of IoT devices over the years. One of the most recent cases is the 2023 strain of Mirai malware [6]. This malware was able to inject binary payloads into TP-Link Archer AX21 routers and turn them into botnets, or systems which attackers have control over without the user’s knowledge. This hack is an example of compromise due to the fact that the router is considered an IoT device; it is able to control other smart devices on their network due to the features implemented by TP-Link [7]. This highlights the possibility for other devices which aren’t associated with IoT (like routers) becoming part of an IoT ecosystem, and then facing the same vulnerabilities as a result. 

Mitigation

Given that IoT devices have weak encryption measures, the first thing a user or business will want to focus on is implementing stronger forms of authentication into their IoT networks. They can do this by implementing MFA to use these IoT devices and add an extra layer of authentication. IoT device owners should also make sure to keep firmware updated on these appliances on top of their antivirus software, as new malware that takes advantage of IoT devices has been releasing for over a decade at this point. Owners will also want to use symmetric cryptographic keys to encrypt and decrypt data as well as asymmetric options such as public and private keys. Lastly, users will want to ensure that high-risk ports such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are closed off or at least heavily monitored so IoT devices aren’t susceptible to exploitation over them [2].

Relevance

IoT devices have impacted the cybersecurity landscape in many ways. For one, these devices have only been adopted more with time as technology has advanced. According to IoT Analytics’ State of IoT Summer 2024 report, there was a 15% growth of IoT devices being used in 2023 over 2022 [4]. These devices have also given attackers more potential entry points for cyber criminals than they had before, making the act of hardening the IoT’s network especially important. As IoT technology advances, so do the tactics of cyber adversaries. The dynamic nature of IoT environments demands continuous adaptation of cybersecurity strategies to address emerging threats effectively.

References

[1] Bodnar D. (2023, December 21). 10 IoT vulnerabilities to be aware of + protection tips. Norton. https://us.norton.com/blog/iot/iot-vulnerabilities

[2] Fortinet. (n.d.). IoT Security Best Practices. Fortinet. https://www.fortinet.com/resources/cyberglossary/iot-best-practices

[3] Rouse, M. (2023, July 19). 5 worst IoT hacking vulnerabilities. IoT For All. https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities

[4] Sinha S. (2023, September 3). Number of connected IoT devices. IoT Analytics. https://iot-analytics.com/number-connected-iot-devices/?utm_source=Press+contacts&utm_campaign=82b6504eb3-SoIoT_Blog_Sep24_PR&utm_medium=email&utm_term=0_59d3095de4-82b6504eb3-345994785&mc_cid=82b6504eb3

[5] Thomas, K. (2023, October 7). Can I Integrate Smart Blinds With A Smart Thermostat? Smart Shades. https://smartshades.net/can-i-integrate-smart-blinds-with-a-smart-thermostat/

[6] Toulas, B. (2023, April 25). TP-Link Archer WiFi router flaw exploited by Mirai malware. BleepingComputer. https://www.bleepingcomputer.com/news/security/tp-link-archer-wifi-router-flaw-exploited-by-mirai-malware/

[7] Wayne-TP. (2023, August 24). Embracing a Dedicated IoT Network with TP-Link Routers. TP-Link Community. https://community.tp-link.com/en/business/stories/detail/502046​

[8] Yasar, K., & Gillis, A. S. (2024, June 21). Internet of Things (IoT). TechTarget. https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT