{"id":12176,"date":"2020-12-22T00:13:47","date_gmt":"2020-12-22T00:13:47","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12176"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"annual-iot-security-report-2019-11","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/annual-iot-security-report-2019-11\/","title":{"rendered":"Annual IoT Security Report 2019-11"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>In this section, we analyze two vulnerabilities, namely, the CVE-2016-10372 vulnerability32 in the Eir D1000 router and the backdoor vulnerability in Netis routers. Except UPnP-related vulnerabilities described in section 4.4.3 Malicious Behaviors Targeting UPnP Vulnerabilities, the CVE-2016-10372<br>vulnerability was exploited most frequently. The backdoor vulnerability in Netis routers exerted a severe impact when it was initially disclosed.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability in the Eir D1000 Router<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Overview<\/h3>\n\n\n\n<p>Eir is an Irish company. There is only one vulnerability (CVE-2016-10372) recorded in the NVD for the Eir D1000 router1. This vulnerability exists because the Eir D1000 router does not properly limit the TR-064 protocol, which allows attackers to execute arbitrary commands via port 7547.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Analysis<\/h3>\n\n\n\n<p>In this section, we analyze the threat trend related to the Eir D1000 router according to the data captured by NSFOCUS&#8217;s threat hunting system. The following subsections analyze these log messages from the aspects of the attack source, attack incidents, and sample download address.<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Finding 4: 23% exploits of the CVE-2016-10372 vulnerability occurred in Brazil. Attackers became active in October 2019. The global distribution of sample download addresses was consistent with that of attack sources.<\/span><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Attack Sources<\/strong><\/li><\/ul>\n\n\n\n<p>Upon deduplication of source IP addresses indicated in capture logs, we found that about 900 IP addresses exploited the CVE-2016-10372 vulnerability. As shown in Figure 3-6, Brazil housed the most source IP addresses that exploited this vulnerability (23%).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"732\" height=\"354\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-1-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12178\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-1-1.jpg 732w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-1-1-300x145.jpg 300w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Attack Incidents<\/strong><\/li><\/ul>\n\n\n\n<p>We analyzed attack incidents recorded in log data of the Eir D1000 router. Here, all messages about one IP address in one day add up to an attack incident. Figure 3-7 shows the monthly number of attack incidents. As shown in Figure 3-7, exploits became active in October 2019.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"561\" height=\"360\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12180\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-2-1.jpg 561w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-2-1-300x193.jpg 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Sample Download Addresses<\/strong><\/li><\/ul>\n\n\n\n<p>After deduplication, we got 860 valid sample download addresses. Figure 3-8 shows the global distribution of sample download addresses related to the vulnerability in the Eir D1000 router. As shown in the figure, Brazil and Iran hosted the most sample download addresses, which coincided with the<br>distribution of attack source IP addresses. We figured that attackers launched attacks from these countries and used compromised devices to spread malicious samples.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"721\" height=\"347\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-3-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12182\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-3-1.jpg 721w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-3-1-300x144.jpg 300w\" sizes=\"(max-width: 721px) 100vw, 721px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Backdoor in Netis Routers<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Overview<\/h3>\n\n\n\n<p>The backdoor in Netis routers was discovered by security researchers from Trend Micro in 2014, who claimed that over 2 million Netis routers were affected. Five years later, related exploits could still be captured by NSFOCUS&#8217;s threat hunting system every day in 2019. Therefore, we deem it necessary to conduct a detailed analysis of the exposure and exploits of the backdoor.<\/p>\n\n\n\n<p>The backdoor of Netis routers provides UDP services via port 53413 and uses a hard-encoded password. Therefore, when a vulnerable device is exposed on the Internet, attackers could easily log in to this device and execute arbitrary code.<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Finding 5: Compared with the situation five years ago, the risk of backdoor exploits facing Netis routers has greatly reduced. There were less than 3000 Netis routers exposed with this backdoor, but attackers have not stopped exploiting this vulnerability.<\/span><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exposed Netis Routers with the Backdoor<\/h3>\n\n\n\n<p>To figure out the number of vulnerable devices around the world, we surveyed all Netis routers with a backdoor exposed on the Internet.<\/p>\n\n\n\n<p>Unless otherwise indicated, all data provided in this section was obtained from a single-round global recon conducted in August 2019.<\/p>\n\n\n\n<p><strong>China hosted the most (approximately 3000) Netis routers with a backdoor, distancing itself from all other countries.<\/strong><\/p>\n\n\n\n<p>The survey data shows that the number had reduced greatly to 3000 in 2019 from 2 million in 2014 when the backdoor was first detected. As shown in Figure 3-9, though 89% of vulnerable Netis routers were exposed in China, the actual number was small. We inferred that the reason why most vulnerable routers were in China was that Netis is a Chinese vendor mainly oriented to the domestic market. According to the data from the Netis router scanning project , the number of vulnerable devices in China was 1028 on October 18, 2019. The deviation occurred probably due to different locations for scanning IP addresses, but we did not put energy into looking into the real causes.<\/p>\n\n\n\n<p>We also verified that all routers could be successfully logged in, but we did not verify whether command execution could be conducted after successful login.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"384\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-4-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12185\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-4-1.jpg 631w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/11\/01222-4-1-300x183.jpg 300w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/figure><\/div>\n\n\n\n<p><em>To be continued.<\/em><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>In this section, we analyze two vulnerabilities, namely, the CVE-2016-10372 vulnerability32 in the Eir D1000 router and the backdoor vulnerability in Netis routers. Except UPnP-related vulnerabilities described in section 4.4.3 Malicious Behaviors Targeting UPnP Vulnerabilities, the CVE-2016-10372vulnerability was exploited most frequently. The backdoor vulnerability in Netis routers exerted a severe impact when it was initially [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5,15],"tags":[470],"class_list":["post-12176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","category-research-reports","tag-iot-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Annual IoT Security Report 2019-11 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Annual IoT Security Report 2019-11 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"In this section, we analyze two vulnerabilities, namely, the CVE-2016-10372 vulnerability32 in the Eir D1000 router and the backdoor vulnerability in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-22T00:13:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Annual IoT Security Report 2019-11 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"In this section, we analyze two vulnerabilities, namely, the CVE-2016-10372 vulnerability32 in the Eir D1000 router and the backdoor vulnerability in\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Annual IoT Security Report 2019-11\",\"datePublished\":\"2020-12-22T00:13:47+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/\"},\"wordCount\":688,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"keywords\":[\"IoT Security\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/\",\"name\":\"Annual IoT Security Report 2019-11 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"datePublished\":\"2020-12-22T00:13:47+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"width\":426,\"height\":289,\"caption\":\"IoT botnets\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-11\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Annual IoT Security Report 2019-11\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual IoT Security Report 2019-11 - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/","og_locale":"pt_BR","og_type":"article","og_title":"Annual IoT Security Report 2019-11 - NSFOCUS","og_description":"In this section, we analyze two vulnerabilities, namely, the CVE-2016-10372 vulnerability32 in the Eir D1000 router and the backdoor vulnerability in","og_url":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/","og_site_name":"NSFOCUS","article_published_time":"2020-12-22T00:13:47+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Annual IoT Security Report 2019-11 - NSFOCUS","twitter_description":"In this section, we analyze two vulnerabilities, namely, the CVE-2016-10372 vulnerability32 in the Eir D1000 router and the backdoor vulnerability in","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Annual IoT Security Report 2019-11","datePublished":"2020-12-22T00:13:47+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/"},"wordCount":688,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","keywords":["IoT Security"],"articleSection":["Blog","DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/","url":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/","name":"Annual IoT Security Report 2019-11 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","datePublished":"2020-12-22T00:13:47+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","width":426,"height":289,"caption":"IoT botnets"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-11\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Annual IoT Security Report 2019-11"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12176"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12176\/revisions"}],"predecessor-version":[{"id":32699,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12176\/revisions\/32699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/11865"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}