{"id":12377,"date":"2021-01-02T00:30:32","date_gmt":"2021-01-02T00:30:32","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12377"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"annual-iot-security-report-2019-14","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/annual-iot-security-report-2019-14\/","title":{"rendered":"Annual IoT Security Report 2019-14"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>This section analyzes WS-Discovery reflection attacks. For details about the WS-Discovery service, see section 1.6 WS-Discovery First Found to Be Abused for DDoS Reflection Attacks.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p><strong>Viewpoint 5: Since security researchers from Baidu disclosed that the Web WS-Discovery protocol could be exploited for DDoS reflection attacks, there has been a notable increase in reflection attack events based on this protocol in the latter half of 2019. Since mid-August, WS-Discovery reflection attacks captured by us had been on the rise. Worse still, September witnessed a sharp increase in such attacks. All parties concerned, including security vendors, service providers, and telecom carriers, should pay due attention to this type of threats.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exposure of the WS-Discovery Service<\/h2>\n\n\n\n<p>To accurately delineate WS-Discovery reflection attacks, we, on the one hand, surveyed the WSDiscovery service exposed on the Internet, and on the other hand, used NSFOCUS&#8217;s threat hunting system to detect WS-Discovery reflection attacks. Data obtained using the two methods is analyzed respectively in the following sections.<\/p>\n\n\n\n<p><strong>Finding 6: Around the world, about 910,000 IP addresses (80% of which (730,000) were video surveillance devices) provided the WS-Discovery service and were thus at risk of being exploited to launch DDoS attacks.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"561\" height=\"298\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12378\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-1.jpg 561w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-1-300x159.jpg 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/figure><\/div>\n\n\n\n<p>As shown in Figure 4-6, the top 5 countries with the most devices that had the WS-Discovery service enabled were China, Vietnam, Brazil, the USA, and South Korea.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"553\" height=\"364\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12379\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-2.jpg 553w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-2-300x197.jpg 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/figure><\/div>\n\n\n\n<p><strong>About 24% of devices responded to WS-Discovery request packets via a random port other than 3702, posing a new challenge to traditional DDoS protection based on source port filtering.<\/strong><\/p>\n\n\n\n<p>According to A10 Networks&#8217; WS-Discovery security research report 35, about 46% of devices respond via a random port. According to our data, about 24% of devices did not respond to WS-Discovery requests via port 3702. Besides, we found that not all of these ports were random and some of them were repeatedly used (such as port 1024).<\/p>\n\n\n\n<p>Responding via a random port poses a great challenge to the mitigation mechanism of WS-Discovery reflection attacks. Unlike the mitigation policy for other reflection attacks, WS-Discovery reflection attacks cannot be prevented simply by creating a rule for blocking traffic from source port 3702.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">WS-Discovery Reflection Attacks<\/h2>\n\n\n\n<p>In this section, through analysis of log messages generated by NSFOCUS&#8217;s threat hunting system over a 74-day period from July 10 to September 21, 2019, we will delve into the threat situation of WSDiscovery reflection attacks from three dimensions: attack vector, attack event, and victim.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Vectors<\/h3>\n\n\n\n<p>In this section, we will analyze attack vectors used by attackers from the perspective of attack payload length. In a blog post, we have discussed the distribution of source ports of attack traffic and the distribution of victims&#8217; IP addresses by network segment.<\/p>\n\n\n\n<p><strong>Finding 7: During a WS-Discovery reflection attack, attackers usually try to craft very short payloads to hit the target, instead of using legitimate service discovery packets as attack payloads. Most attack payloads contain only three bytes, registered in two-thirds of attack log messages. The average bandwidth amplification factor achieved by such payloads was 443.<\/strong><\/p>\n\n\n\n<p>Figure 4-7 shows our statistics on packet payloads indicated in WS-Discovery reflection attack log data. In order not to make attack packets known to other hackers, we name attack payloads by using the attack length. For example, if an attack packet&#8217;s application-layer length is three bytes, we name it payload3. According to our statistics, the top 5 payloads together represented over 99% of all attack traffic. We also found that none of these five types of payloads were legitimate service discovery packets and the smallest ones contained only two bytes. Most attack payloads contained three bytes, accounting for about two-thirds of the total attack packets.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"684\" height=\"281\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-3-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12381\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-3-1.jpg 684w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-3-1-300x123.jpg 300w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/figure><\/div>\n\n\n\n<p>A network-wide probe of payload3 packets revealed that not all WS-Discovery services responded to them. Altogether there were 28,918 IP addresses responding to these requests.<\/p>\n\n\n\n<p>Figure 4-8 shows the global distribution of devices responding to payload3. We can see that the top 3 countries hosting the most responding devices were the USA, South Korea, and China. In terms of device types, video surveillance devices and printers dominated, with the former accounting for 75% of the total devices.<\/p>\n\n\n\n<p>Response packets captured by our honeypots varied from hundreds to thousands of bytes in length, averaging out at 1330 bytes. Thus, the average bandwidth amplification factor (BAF)  stood at 443.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"490\" height=\"356\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-4-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12383\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-4-1.jpg 490w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-4-1-300x218.jpg 300w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Incidents<\/h3>\n\n\n\n<p>We analyzed attack incidents captured by NSFOCUS&#8217;s threat hunting system. Here, all attack records about one IP address in one day add up to an attack incident. Figure 4-9 shows the daily number of attack incidents. At a glance, WS-Discovery reflection attack incidents fluctuated all the time, but have been on the rise generally since mid-August, especially in September. This indicates that WS-Discovery reflection attacks have been gradually adopted as a regular weapon of DDoS attacks, to which all parties concerned, including security vendors, service providers, and telecom operators, should pay due attention.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"318\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-5-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12385\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-5-1.jpg 626w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-5-1-300x152.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Victims<\/h3>\n\n\n\n<p>Figure 4-10 shows the global distribution of WS-Discovery reflection attack victims. We observed that up to 24 countries and regions were hit by this kind of attack. China was most targeted by WS-Discovery reflection attacks, home to 33% of victim IP addresses, followed by the USA (21%).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"526\" height=\"304\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-6-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12387\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-6-1.jpg 526w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/10101-6-1-300x173.jpg 300w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/><\/figure><\/div>\n\n\n\n<p><em>To be continued.<\/em><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>This section analyzes WS-Discovery reflection attacks. For details about the WS-Discovery service, see section 1.6 WS-Discovery First Found to Be Abused for DDoS Reflection Attacks.<\/p>\n","protected":false},"author":1,"featured_media":11865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[15],"tags":[470],"class_list":["post-12377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-reports","tag-iot-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Annual IoT Security Report 2019-14 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Annual IoT Security Report 2019-14 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"This section analyzes WS-Discovery reflection attacks. For details about the WS-Discovery service, see section 1.6 WS-Discovery First Found to Be Abused\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-02T00:30:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Annual IoT Security Report 2019-14 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"This section analyzes WS-Discovery reflection attacks. For details about the WS-Discovery service, see section 1.6 WS-Discovery First Found to Be Abused\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Annual IoT Security Report 2019-14\",\"datePublished\":\"2021-01-02T00:30:32+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/\"},\"wordCount\":833,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"keywords\":[\"IoT Security\"],\"articleSection\":[\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/\",\"name\":\"Annual IoT Security Report 2019-14 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"datePublished\":\"2021-01-02T00:30:32+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/IoT-report1-e1684397874265.jpg\",\"width\":426,\"height\":289,\"caption\":\"IoT botnets\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/annual-iot-security-report-2019-14\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Annual IoT Security Report 2019-14\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual IoT Security Report 2019-14 - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/","og_locale":"pt_BR","og_type":"article","og_title":"Annual IoT Security Report 2019-14 - NSFOCUS","og_description":"This section analyzes WS-Discovery reflection attacks. For details about the WS-Discovery service, see section 1.6 WS-Discovery First Found to Be Abused","og_url":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/","og_site_name":"NSFOCUS","article_published_time":"2021-01-02T00:30:32+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Annual IoT Security Report 2019-14 - NSFOCUS","twitter_description":"This section analyzes WS-Discovery reflection attacks. For details about the WS-Discovery service, see section 1.6 WS-Discovery First Found to Be Abused","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Annual IoT Security Report 2019-14","datePublished":"2021-01-02T00:30:32+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/"},"wordCount":833,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","keywords":["IoT Security"],"articleSection":["Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/","url":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/","name":"Annual IoT Security Report 2019-14 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","datePublished":"2021-01-02T00:30:32+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/IoT-report1-e1684397874265.jpg","width":426,"height":289,"caption":"IoT botnets"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/annual-iot-security-report-2019-14\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Annual IoT Security Report 2019-14"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12377"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12377\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/11865"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}