Bbabo NET

Science & Technology News

Research: Raspberry Pi and Linux Device Credentials Are Most Often Compromised

Researchers from Bulletproof have found that hackers most often access servers with the same widely used passwords, which are often used by default. This usually compromises the credentials of devices running Raspberry Pi and Linux.

Bulletproof noted that bot traffic currently accounts for 70% of all internet activity. However, hackers tend to use automated attack methods, and default credentials are the most common passwords used by cybercriminals.

More than 200 thousand systems running the standard Raspberry Pi OS have been found on the Web. A similar problem applies to systems running Linux.

Cybersecurity researchers emphasize that using default credentials provides one of the easiest entry points for attackers. At the same time, such data allows hackers not only to avoid detection, but also significantly complicates the investigation and monitoring of attacks.

The company advises:

check deployed cloud instances,

use two-factor authentication (2FA), since user credentials are still the main target of attacks,

control traffic that enters unprotected systems,

keep track of the latest vulnerabilities to prioritize fixes and quickly respond to incidents.

Research: Raspberry Pi and Linux Device Credentials Are Most Often Compromised