Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware

03/03/2022
by   Elsa Rodríguez, et al.
0

Consumer IoT devices may suffer malware attacks, and be recruited into botnets or worse. There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware. Less is known about persistent malware, which resides on persistent storage, requiring targeted manual effort to remove it. This paper presents a field study on the removal of persistent IoT malware by consumers. We partnered with an ISP to contrast remediation times of 760 customers across three malware categories: Windows malware, non-persistent IoT malware, and persistent IoT malware. We also contacted ISP customers identified as having persistent IoT malware on their network-attached storage devices, specifically QSnatch. We found that persistent IoT malware exhibits a mean infection duration many times higher than Windows or Mirai malware; QSnatch has a survival probability of 30 observed malware types have been removed. For interviewed device users, QSnatch infections lasted longer, so are apparently more difficult to get rid of, yet participants did not report experiencing difficulty in following notification instructions. We see two factors driving this paradoxical finding: First, most users reported having high technical competency. Also, we found evidence of planning behavior for these tasks and the need for multiple notifications. Our findings demonstrate the critical nature of interventions from outside for persistent malware, since automatic scan of an AV tool or a power cycle, like we are used to for Windows malware and Mirai infections, will not solve persistent IoT malware infections.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/09/2022

NURSE: eNd-UseR IoT malware detection tool for Smart homEs

Traditional techniques to detect malware infections were not meant to be...
research
05/23/2020

Devising Malware Characterstics using Transformers

With the increasing number of cybersecurity threats, it becomes more dif...
research
02/10/2019

Analyzing Endpoints in the Internet of Things Malware

The lack of security measures in the Internet of Things (IoT) devices an...
research
10/24/2020

Safeguarding the IoT from Malware Epidemics: A Percolation Theory Approach

The upcoming Internet of things (IoT) is foreseen to encompass massive n...
research
11/06/2020

Towards Obfuscated Malware Detection for Low Powered IoT Devices

With the increased deployment of IoT and edge devices into commercial an...
research
05/13/2019

Analyzing "Not-a-Virus" Bundled Adware: The Wajam Case

Case studies on malicious code mostly focus on botnets and worms (recent...
research
01/13/2020

Malware propagation in urban D2D networks

We introduce and analyze models for the propagation of malware in pure D...

Please sign up or login with your details

Forgot password? Click here to reset