New research conducted by cybersecurity firm Armis has unveiled the riskiest assets that pose a threat to global businesses. Armis’ study focused on assets that experienced the most attack attempts, were vulnerable to weaponized Common Vulnerabilities and Exposures (CVEs), and held high-risk ratings. According to data sourced from the Armis Asset Intelligence Engine, the research found that Internet of Medical Things (IoMT) assets, which encompass connected devices used in medical and healthcare settings, are particularly susceptible to unpatched and weaponized CVEs.
Simultaneously, operational technology (OT) assets emerged as the most frequently targeted by cyberattacks. The study by Armis highlights a concerning trend in the prevalence of network-connected assets vulnerable to unpatched and weaponized CVEs. These findings, based on the highest percentage of devices of each type affected between August 2022 and July 2023, underscore the substantial risks these assets introduce to businesses when left unaddressed.
In this article, you will learn about the nine most vulnerable and most targeted assets.
Table of Contents
9 Most Vulnerable and Most Attacked Assets
1. Medical Devices (IoMT), 62%:
2. Infusion Pumps (IoMT), 26%
3. IP Cameras (IoT), 26%:
4. Media Players (IoT), 25%:
5. Switches (IT), 18%
6. Engineering Workstations (OT), 17%
7. Personal Smartwatches (IoPT), 16%
8. Routers (IT), 15%
9. SCADA Servers (OT), 15%
9 Most Vulnerable and Most Attacked Assets
Here are nine most vulnerable and most attacked assets according to Armis.
1.Medical Devices (IoMT), 62%:
The Internet of Medical Things (IoMT) has revolutionized healthcare by enabling remote monitoring and improved patient care. However, a significant concern is the vulnerability of medical devices like infusion pumps and pacemakers due to inadequate cybersecurity measures. These devices are often targeted by cybercriminals due to their life-critical nature, and successful attacks could have dire consequences for patients. Therefore, healthcare organizations are under pressure to prioritize cybersecurity to protect these devices and ensure patient safety.
2. Infusion Pumps (IoMT), 26%
Infusion pumps are a critical component of patient care in hospitals, delivering precise medication dosages. Their vulnerability to cyberattacks is a major concern, as unauthorized access can lead to incorrect dosages or even stop the pumps altogether. Protecting these assets is essential to ensure patient safety.
To safeguard infusion pumps and ensure patient safety, healthcare facilities must implement robust cybersecurity measures. This includes regularly updating the pumps’ firmware and software to patch vulnerabilities, implementing network segmentation to isolate them from other hospital systems, and using strong authentication protocols to prevent unauthorized access.
Continuous monitoring and intrusion detection systems can help detect and respond to any suspicious activity, while staff training on cybersecurity best practices is crucial to mitigate the human factor in potential breaches. By prioritizing cybersecurity for infusion pumps, hospitals can maintain the integrity of medication delivery and protect the well-being of their patients.
3. IP Cameras (IoT), 26%:
IP cameras, a common component of the Internet of Things (IoT), are widely used for security and surveillance purposes. Yet, their widespread deployment and often lax security practices make them susceptible to hacking. Cybercriminals can exploit these vulnerabilities to gain unauthorized access to sensitive areas or launch surveillance-based attacks, posing risks to individuals and organizations. Ensuring the security of IP cameras is crucial to safeguard privacy and security.
4. Media Players (IoT), 25%:
IoT media players, used in digital signage and home entertainment systems, are at risk of cyberattacks due to their network connectivity. These devices are frequently overlooked in terms of security, making them appealing targets for hackers. When compromised, they can display malicious content or serve as entry points into connected networks, potentially leading to further intrusions. To mitigate these risks, users and organizations must implement robust security measures and keep their IoT media players updated with the latest security patches to prevent unauthorized access and cyberattacks.
5. Switches (IT), 18%
Network switches are fundamental components of IT infrastructure, making them an attractive target for cybercriminals seeking to disrupt an organization’s operations. Compromised switches can lead to network outages, data breaches, and other serious consequences. Securing these assets is vital for network stability.
6. Engineering Workstations (OT), 17%
Operational Technology (OT) environments, including those in industrial settings, rely on engineering workstations for control and monitoring. These workstations often run legacy software and lack robust security, making them vulnerable to attacks that can disrupt critical processes and cause industrial accidents. That is why businesses should invest in Anti DDoS solutions to prevent business disruption.
7. Personal Smartwatches (IoPT), 16%
Personal Internet of Personal Things (IoT) devices, like smartwatches, have gained popularity in recent years. While they offer convenience, they also collect sensitive health and location data. Cybercriminals may target these devices to steal personal information or track individuals without their consent.
8. Routers (IT), 15%
Routers are the gateways to an organization’s network, making them a prime target for cyberattacks. Compromised routers can lead to traffic interception, unauthorized access, and network-wide vulnerabilities. Strengthening router security is essential to protect against these threats. Enhancing router security is paramount in safeguarding an organization’s network infrastructure.
Organizations should regularly update router firmware to address known vulnerabilities, employ strong password policies and multi-factor authentication for router access, and implement robust firewall rules and intrusion detection systems to monitor and filter incoming and outgoing traffic.
Additionally, continuous network monitoring and regular security audits can help identify and address potential weaknesses, ensuring that routers remain a resilient defense against cyber threats, ultimately preserving the integrity and confidentiality of sensitive data within the organization.
9. SCADA Servers (OT), 15%
Supervisory Control and Data Acquisition (SCADA) systems are vital in industrial and critical infrastructure sectors. Attacking SCADA servers can have devastating consequences, including power outages and equipment damage. Securing these assets is paramount to safeguarding critical infrastructure. Robust cybersecurity measures for SCADA systems should include network isolation, regular security assessments, intrusion detection systems, and strict access controls..
Which is the most vulnerable and most targeted asset in your opinion? Share it with us in the comments section below.