A series of attacks took place in various media, from refrigerators and TVs used to send spam, to hackers who infiltrated baby monitors and tried to talk to children. It should be noted that most IoT attacks do not target the devices themselves, but rather use IoT devices as the entry point to the network.
For example, in 2010, researchers found that the Stuxnet virus was used to physically damage centrifuges in Iran, with attacks starting in 2006 being the primary attack in 2009. Stuxnet virus, generally regarded as one of the oldest examples of IoT attack, uses malware to infect instructions sent by programmable logic controllers (PLCs) by targeting centralized control and data acquisition (SCADA) systems in industrial control systems (ICS).
In December 2013, Proofpoint Inc.’s corporate security company researcher discovered the first IoT botnet. According to the researcher, more than 25% of botnet consisted of non-computer devices such as smart TVs, baby monitors and home appliances.
In 2015, security researchers Charlie Miller and Chris Valasek wirelessly attacked a Jeep, changed the radio station in the car’s media center, switched on the windscreen wipers and air conditioning, and stopped the accelerator pedal to operate. They said they could kill the engine, activate the brakes, and completely deactivate the brakes. Miller and Valasek were able to infiltrate the vehicle’s network via Urys, Chrysler’s in-car connection system.