FBI Warns of Possible Cyberattacks on IoT Networks - RTInsights

FBI Warns of Possible Cyberattacks on IoT Networks

FBI Warns of Possible Cyberattacks on IoT Networks

The FBI announcement warns that bad actors could be using IoT devices as proxies for anonymity and pursuit of malicious cyber activities.

Written By
Sue Walsh
Sue Walsh
Aug 22, 2018
2 minute read

The FBI has issued a public service announcement warning of the potential for serious cyberattacks on IoT networks. The alert warns that cyber attackers often use IoT devices as anonymous proxies to conduct malicious activities. This news comes as no surprise to those in the industry, who’ve expressed concern for years that the IoT’s security issues make it vulnerable to attack.

Hackers and cybercriminals seek and compromise vulnerable IoT devices (smart devices) and turn them into proxies or intermediaries. Cyber attackers use these tools to route malicious traffic for cyber attacks or to exploit unsecured computer networks.

See also: Taking on next-generation cyberattacks with streaming analytics

Common Targeted IoT Devices

The FBI’s warning lists a range of IoT Devices that, when lacking proper security, become attractive targets for cyberattacks:

  • Routers
  • Wireless radios links
  • Time clocks
  • Audio/ video streaming devices
  • Raspberry PIs
  • IP cameras
  • DVRs
  • Satellite antenna equipment
  • Smart garage door openers
  • Network attached storage devices

IoT proxy servers attract hackers and cybercriminals because they transmit all internet requests through the device’s IP address, affording a level of anonymity. Hackers prize IoT devices in developed nations because they allow access to business websites that block traffic from foreign or shady IPs. Using an IoT device makes it very difficult to differentiate between malicious and regular traffic.

The alert includes a list of clues that may indicate a compromise. It also includes a list of how best to secure your network and devices, including:

  • Using a firewall
  • Rebooting devices regularly
  • Changing default usernames and passwords
  • Keeping firmware updated and installing patches

Without a universal standard, owners must take responsibility for securing their own devices and networks.

Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Featured Resources from Cloud Data Insights

Why Network Architecture is the Real Constraint on Real-Time AI
Michael Reid
May 11, 2026
Lyrie.ai Deploys Real-Time Zero-Day Tracking Across Global Enterprise Infrastructure
TechnologyWire
May 11, 2026
Real-time Analytics News for the Week Ending May 9
Why AI Needs a High Fiber Diet
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.