IoT devices as silent gateways for attackers

The number of connected devices is growing rapidly – and with it the risk of falling victim to an IoT botnet attack. What used to be a niche problem now affects smart speakers, surveillance cameras, industrial control systems, routers, medical devices and even vehicle components.

Precisely because IoT devices often appear inconspicuous, they become silent gateways for attackers. A compromised device then works unnoticed in a botnet – and can become part of massive cyber attacks that paralyse entire companies or even parts of the internet.

But there is good news:

This risk can be drastically reduced with verifiable, decentralised identities.
How does this work? We’ll show you here.

IoT botnets:
The underestimated threat

An IoT botnet consists of compromised devices that are under the control of an attacker. These devices appear completely normal to the outside world, but execute commands in the background – whether DDoS attacks, cryptomining, spreading malware or manipulating critical data.

One of the most well-known cases is Mirai. Originally created “by accident” by three developers, the Mirai botnet paralysed large parts of the internet in 2016 – including major platforms such as Twitter, LinkedIn and entire banking environments. The subsequent release of the source code – a deliberate strategy to conceal its origin – continues to this day to ensure that new variants keep emerging.

Since 2024, security researchers have also observed a significant increase in such botnet activity – increasingly professional, partly state-organised and technically sophisticated.

Why IoT devices are particularly affected

Many IoT devices are vulnerable because:

  • Standard passwords are not changed
  • Updates are missing or not even planned
  • Weak or outdated cryptographic methods are used
  • Manufacturers of inexpensive consumer devices place little emphasis on security
  • Users themselves have no IT expertise

The result:

A botnet can spread quickly, quietly and decentrally – and cause enormous damage. In addition to production downtime and IT outages, manufacturers who fail to meet CRA or RED requirements will also face heavy penalties in future.

Zero Trust for IoT – Identities instead of passwords

The key question is:
How can I ensure that every device is unique – and only does what it is allowed to do?

The answer:
Verifiable, decentralised identities (DID & VC).

Instead of passwords or mountains of certificates, modern IoT systems will in future work with cryptographically secured identities that:

  • cannot be guessed
  • cannot be compromised via central servers
  • contain forgery-proof attributes
  • can be managed throughout their entire life cycle

This principle is not new – the EU is currently introducing digital citizenship (EUDI Wallet) based on the same standards. And it is precisely these technologies that we at filancore are bringing to the IoT world.

How do verifiable identities work in the IoT?

Each device is assigned a unique digital identity during production. Manufacturers can issue cryptographically signed authorisations, e.g.:

  • Who is permitted to configure the device?
  • Where is it permitted to connect?
  • From whom is it permitted to receive updates?
  • What data is it permitted to send?

This allows a device to check at any time:

  • Who is giving him instructions
  • Whether this person or machine is authorised
  • Whether manipulated software is to be installed

The result:
no passwords, no certificate hell – instead, zero trust at device level.

A practical example:
secure smart care products

A partner company in the healthcare sector develops smart home devices for people in need of care. These devices must be particularly safe, as they enable, among other things:

  • Video communication with carers
  • Opening smart doors
  • Vital notifications
  • Remote access for service personnel

The problem: many users are not IT-savvy. Passwords or complex update processes would be a security risk – and simply not practical.

Filancore solved the following issues:

✔ Easy to use

Devices can be put into operation via QR code or automatically – without any technical hurdles for nursing staff or relatives.

filancore develops solutions to transform your IoT landscape into a secure, interoperable environment.

✔ Ownership

Sensitive data remains transparent to the owner, who decides on its availability and disclosure.

✔ Easy integration & onboarding

Third parties and service providers can be seamlessly added and granted access to relevant data on a need-to-know basis.

Passwordless authentication

Each device has a strong cryptographic identity. Only those with the appropriate authorisation can access it – without any passwords.

✔ Cost savings compared to PKI

Since no traditional certificate PKI is required, infrastructure and maintenance costs are significantly reduced – often by a factor of 5–10.

✔ Tamper-proof over-the-air updates

Updates are only accepted if they have been cryptographically verified by the manufacturer. This means that a botnet cannot install a manipulated update.

✔ Protection against botnet takeover

Without passwords and with secure update processes, the risk of compromise is drastically reduced.

Why verifiable identities are becoming the new standard

The increasing threat situation, new EU regulations and growing complexity in the IoT lead to one clear conclusion: Without verifiable identities, IoT devices can no longer be operated securely in the long term.

Decentralised identities create an ecosystem in which every device is:

  • Uniquely identifiable
  • Verifiable at any time
  • Cryptographically securedTamper-resistant
  • Compliant with standards

– completely without central single points of failure.

Conclusion: IoT security begins with identity

IoT botnets are not a hypothetical risk, but a reality. However, the solution is just as real: verifiable identities create the basis for zero-trust security in the IoT – simple, scalable and future-proof.

filancore supports manufacturers in using these technologies without complex integration hurdles – from the initial device identity to global rollout.

How is your IoT security

Request your free quick check

If you would like to know how well your current IoT security architecture is positioned, we recommend our IoT Security Quick Check – free of charge and without obligation. Just contact us via the email form below: