Skip to main content
Mallory

Physical Security Risks from IoT and Connected Devices in Enterprise Environments

initial-access-methodembedded-device-vulnerabilityunmanaged-asset-discoverycritical-infrastructure-threat
Updated March 21, 2026 at 03:04 PM2 sources
Share:
Physical Security Risks from IoT and Connected Devices in Enterprise Environments

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A recent attempted cyberattack on a French ferry highlighted the growing threat posed by physical access to enterprise networks through small, easily concealed devices such as Raspberry Pi computers. The attacker attempted to compromise the vessel’s operations by plugging a Raspberry Pi paired with a cellular modem into the network, but was thwarted due to effective network segregation and the absence of remote access to critical controls. Security analysts warn that many enterprises are vulnerable to similar attacks, as their physical security measures often lag behind their digital defenses, leaving them exposed to threats from rogue devices introduced onsite.

This incident underscores the broader issue of IoT and connected device security in enterprise settings, where digital signage, smart displays, and other networked endpoints are frequently overlooked as potential attack vectors. As organizations deploy increasing numbers of such devices across distributed locations, the attack surface expands, and the risk of compromise grows. Experts emphasize the need for robust physical security controls, network segmentation, and heightened awareness of the risks posed by seemingly innocuous devices that can provide attackers with a foothold inside corporate networks.

Timeline

  1. Dec 18, 2025

    HKCERT identifies digital signage as an emerging attack target

    The Hong Kong Computer Emergency Response Team Coordination Centre identified digital signage systems as an emerging cybersecurity target. The reference also notes that more than half of surveyed enterprises expressed concern about the risk posed by these often-neglected IoT deployments.

  2. Dec 17, 2025

    Attempted attack on French ferry uses Raspberry Pi on vessel network

    An attacker reportedly plugged a Raspberry Pi equipped with a cellular modem into a French ferry's network in an attempt to gain remote access. The effort was thwarted because network segregation and the lack of remote access to critical controls prevented lateral movement and sabotage.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Enterprise Risk from Unmanaged and Diverse xIoT and OT Devices

Enterprise Risk from Unmanaged and Diverse xIoT and OT Devices

Enterprises are increasingly exposed to cybersecurity risks due to the proliferation of unmanaged and diverse extended Internet of Things (xIoT) and operational technology (OT) devices within their networks. Research analyzing over 10 million devices across 700 organizations found that two-thirds of networked devices are not traditional IT assets, but rather include network gear, OT, IoT, and medical equipment. Common high-risk device types such as VoIP phones, IP cameras, point-of-sale systems, and uninterruptible power supplies are often widespread yet remain unmanaged, creating significant security blind spots. The diversity of device functions, vendors, and operating system versions further complicates risk management, making it challenging for security teams to identify, patch, and mitigate vulnerabilities effectively. Manufacturers, in particular, face heightened OT security challenges due to legacy technology, lack of asset visibility, and the growing number of access points resulting from mergers and acquisitions. The complexity of managing access permissions, especially with multiple users sharing admin accounts, increases the difficulty of incident response and overall security posture. Despite increased awareness of these risks, the combination of device diversity, legacy systems, and human factors continues to present substantial obstacles to securing enterprise and manufacturing environments against cyber threats.

1 months ago
Enterprise Risks from Insecure Third-Party IoT Devices and Botnets

Enterprise Risks from Insecure Third-Party IoT Devices and Botnets

Organizations face significant cybersecurity risks from the proliferation of insecure third-party Internet of Things (IoT) devices, which often lack robust security controls and are increasingly targeted by cybercriminals. The BADBOX 2.0 botnet exemplifies this threat, having infected over a million low-cost Android-based IoT devices such as smart TVs, many of which are shipped with preinstalled malware or compromised through malicious applications. These infected devices are then leveraged to create large-scale residential proxy networks, enabling cybercriminals to conduct ad fraud, credential stuffing, and other illicit activities while masking their true origins. The FBI has warned that compromised IoT devices are being abused at scale, including on home and small office networks used for work, making them a significant liability for enterprises when connected to corporate environments. The rapid growth of IoT adoption—currently estimated at over 17 billion connected devices worldwide—has expanded the attack surface for organizations, introducing challenges such as limited device resources, inconsistent security measures, and the need for strong authentication and encryption. Security experts recommend that organizations implement rigorous procurement controls, demand verifiable updates and transparent software bills of materials from vendors, and develop comprehensive IoT security strategies that include proactive threat detection and end-to-end security frameworks. Robust IoT software testing and policy development are essential to mitigate these risks and ensure the secure operation of IoT devices within enterprise networks.

2 weeks ago
Enterprise and Critical Infrastructure Threats from Unpatched and Unmanaged Devices

Enterprise and Critical Infrastructure Threats from Unpatched and Unmanaged Devices

Recent research highlights that enterprise networks are increasingly vulnerable due to a high prevalence of legacy, end-of-life (EOL) systems, unpatched devices, and poor network segmentation. Telemetry from over 27 million devices across 1,800 enterprises reveals that 26% of Linux and 8% of Windows systems are running unsupported operating systems, with 39% of IT devices lacking active endpoint security. Additionally, a significant portion of devices operate outside IT control, and 77% of corporate networks are poorly segmented, allowing low-security devices to share network space with high-value assets, increasing the risk of lateral movement by attackers. Simultaneously, critical infrastructure sectors such as energy, healthcare, government, and transportation are experiencing a surge in cyberattacks targeting IoT and Android devices. Attackers are exploiting the interconnectedness of these industries for financial gain, with the U.S. being the primary target. The rise in attacks underscores the need for stringent tracking of user behaviors, robust access controls, accurate asset inventories, and improved network segmentation to mitigate risks posed by unmanaged and vulnerable devices in both enterprise and critical infrastructure environments.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Physical Security Risks from IoT and Connected Devices in Enterprise Environments | Mallory