Skip to main content
Mallory
Mallory

Enterprise Risks from Insecure Third-Party IoT Devices and Botnets

IoTbotnetsecurity strategiesmalwarethird-party
Updated October 31, 2025 at 03:01 PM2 sources

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Organizations face significant cybersecurity risks from the proliferation of insecure third-party Internet of Things (IoT) devices, which often lack robust security controls and are increasingly targeted by cybercriminals. The BADBOX 2.0 botnet exemplifies this threat, having infected over a million low-cost Android-based IoT devices such as smart TVs, many of which are shipped with preinstalled malware or compromised through malicious applications. These infected devices are then leveraged to create large-scale residential proxy networks, enabling cybercriminals to conduct ad fraud, credential stuffing, and other illicit activities while masking their true origins. The FBI has warned that compromised IoT devices are being abused at scale, including on home and small office networks used for work, making them a significant liability for enterprises when connected to corporate environments.

The rapid growth of IoT adoption—currently estimated at over 17 billion connected devices worldwide—has expanded the attack surface for organizations, introducing challenges such as limited device resources, inconsistent security measures, and the need for strong authentication and encryption. Security experts recommend that organizations implement rigorous procurement controls, demand verifiable updates and transparent software bills of materials from vendors, and develop comprehensive IoT security strategies that include proactive threat detection and end-to-end security frameworks. Robust IoT software testing and policy development are essential to mitigate these risks and ensure the secure operation of IoT devices within enterprise networks.

Sources

October 31, 2025 at 12:00 AM
October 31, 2025 at 12:00 AM

Related Stories

Enterprise Risk from Unmanaged and Diverse xIoT and OT Devices

Enterprises are increasingly exposed to cybersecurity risks due to the proliferation of unmanaged and diverse extended Internet of Things (xIoT) and operational technology (OT) devices within their networks. Research analyzing over 10 million devices across 700 organizations found that two-thirds of networked devices are not traditional IT assets, but rather include network gear, OT, IoT, and medical equipment. Common high-risk device types such as VoIP phones, IP cameras, point-of-sale systems, and uninterruptible power supplies are often widespread yet remain unmanaged, creating significant security blind spots. The diversity of device functions, vendors, and operating system versions further complicates risk management, making it challenging for security teams to identify, patch, and mitigate vulnerabilities effectively. Manufacturers, in particular, face heightened OT security challenges due to legacy technology, lack of asset visibility, and the growing number of access points resulting from mergers and acquisitions. The complexity of managing access permissions, especially with multiple users sharing admin accounts, increases the difficulty of incident response and overall security posture. Despite increased awareness of these risks, the combination of device diversity, legacy systems, and human factors continues to present substantial obstacles to securing enterprise and manufacturing environments against cyber threats.

4 months ago

Enterprise and Critical Infrastructure Threats from Unpatched and Unmanaged Devices

Recent research highlights that enterprise networks are increasingly vulnerable due to a high prevalence of legacy, end-of-life (EOL) systems, unpatched devices, and poor network segmentation. Telemetry from over 27 million devices across 1,800 enterprises reveals that 26% of Linux and 8% of Windows systems are running unsupported operating systems, with 39% of IT devices lacking active endpoint security. Additionally, a significant portion of devices operate outside IT control, and 77% of corporate networks are poorly segmented, allowing low-security devices to share network space with high-value assets, increasing the risk of lateral movement by attackers. Simultaneously, critical infrastructure sectors such as energy, healthcare, government, and transportation are experiencing a surge in cyberattacks targeting IoT and Android devices. Attackers are exploiting the interconnectedness of these industries for financial gain, with the U.S. being the primary target. The rise in attacks underscores the need for stringent tracking of user behaviors, robust access controls, accurate asset inventories, and improved network segmentation to mitigate risks posed by unmanaged and vulnerable devices in both enterprise and critical infrastructure environments.

4 months ago

Physical Security Risks from IoT and Connected Devices in Enterprise Environments

A recent attempted cyberattack on a French ferry highlighted the growing threat posed by physical access to enterprise networks through small, easily concealed devices such as Raspberry Pi computers. The attacker attempted to compromise the vessel’s operations by plugging a Raspberry Pi paired with a cellular modem into the network, but was thwarted due to effective network segregation and the absence of remote access to critical controls. Security analysts warn that many enterprises are vulnerable to similar attacks, as their physical security measures often lag behind their digital defenses, leaving them exposed to threats from rogue devices introduced onsite. This incident underscores the broader issue of IoT and connected device security in enterprise settings, where digital signage, smart displays, and other networked endpoints are frequently overlooked as potential attack vectors. As organizations deploy increasing numbers of such devices across distributed locations, the attack surface expands, and the risk of compromise grows. Experts emphasize the need for robust physical security controls, network segmentation, and heightened awareness of the risks posed by seemingly innocuous devices that can provide attackers with a foothold inside corporate networks.

2 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.