Intelligence alliance Five Eyes warns of attacks on edge and IoT devices and addresses the public with security guidelines.
IoT devices are used en masse in the OT sector in conjunction with edge systems. In production, they are often found in measurement and control technology. They usually form a bridge between internal and external networks such as the internet. However, many companies are either unaware of them or treat them very neglectfully. Attackers benefit from this. Western intelligence services are concerned and taking unusual measures.
It is extremely rare for intelligence agencies to address the public and issue recommendations. Now they have done so and published guidelines for improving the cybersecurity of edge and IoT (Internet of Things) devices. According to the services, the background to this is a worrying increase in attacks on these components, particularly in the OT sector and in the area of critical infrastructure (KRITIS).
These devices are rarely at the centre of IT security. They are often completely overlooked and in many companies, neither model, location nor even the number of these devices are known. This makes them a preferred target for cyberattacks. "Attacks on edge devices have become the favoured tactic for many cyber threat actors, including state-sponsored ones," warn the intelligence services in their publications.
The Anglo-American intelligence alliance, consisting of Australia, Canada, New Zealand, the UK and the USA, is informally referred to as Five Eyes. Among other things, this alliance serves to share intelligence and has divided up its surveillance activities. They also share their technical resources. Not much is known about the Five Eyes, which is the nature of intelligence services. All in all, the alliance is considered to be very effective. For the current joint warning, each intelligence service has taken a different focus and recorded the results in a separate document. Most of these are now available. They published their "Security Considerations for Edge Devices" in a series of guides. "These guides outline various considerations and strategies for a more secure and resilient network both before and after a compromise," according to a joint statement.