We are currently dealing with a Camera Device that has been used in botnet attacks that is housed behind an Ethernet connection to an RB1100AHx2.
I have contacted the manufacturer of the device and followed all recommendations and a firmware version change, yet we’ve still received reports of malicious activity.
The camera belongs to a client of ours and we’d like to not have to dispatch a climb to replace the physical camera unit.
I am looking for any advice on Filter Rules or otherwise I may be able to implement to limit the malicious activity that may take place if the device is left connected.
It’s not ideal, but if you put it in isolated L2 segment, allow only the minimum necessary traffic and block the rest, it should be pretty safe. For example, if it should be connecting to outside world to upload some data, then allow only selected target server and port. If someone should be connecting to it, then allow only selected source addresses.
If you’re referring to the currently ongoing war, then that’s in Europe. Even if you’re not, I don’t see how starting a war on some continent is any different (better or worse) than starting it on another continent.
On topic, I agree that IoT devices should be treated as if they were infested with malware right as shipped from factory. (IT) Security is not a craft, it’s state of mind … and vast majority of software developers don’t have it.