Article IT security and cybersecurity
Team Support Online | 2025-10-20

The Internet of Things in Hackers' Crosshairs – Cyberattacks from Unusual Sites

Unusual network attacks are increasingly starting with devices we wouldn't normally even consider – air conditioning, printers, CCTV cameras, and smart home appliances and electronics connected to the internet. Hackers are increasingly focusing on computers and servers alone. Instead, they're increasingly targeting peripherals and devices operating in key parts of corporate infrastructure.

Unusual network attacks are increasingly starting with devices we wouldn't normally even consider – air conditioning, printers, CCTV cameras, and smart home appliances and electronics connected to the internet. Hackers are increasingly focusing on computers and servers alone. Instead, they're increasingly targeting peripherals and devices operating in key parts of corporate infrastructure.

🔍

The Most Notorious Surprising Cybersecurity Incidents

In 2025, a high-profile incident involving Procolored printers came to light. For about six months, their official drivers were available for download with embedded malware. This virus was capable of taking over a user's computer with a remote access Trojan that also monitored the clipboard and swapped cryptocurrency wallet numbers. In practice, this meant that someone could copy their Bitcoin transfer address, and the software would "swap" it with the address belonging to criminals. This resulted in the theft of over 9 Bitcoins, worth approximately $1 million at the time.

How to protect your company from unusual cyberattacks?

Such cases demonstrate that office equipment can become a serious security threat to the entire company. Therefore, it is crucial to:

  • Regularly update the software on printers and other devices.
  • Change default logins and passwords.
  • Avoid directly connecting print servers to Active Directory, as a hacker could gain access to accounts and other resources on the company network if compromised.
  • Regularly train employees to increase their cybersecurity awareness.

An example of an incident involving an HVAC system – Heating, Ventilation, and Air Conditioning

In 2023, the Dark Angels group attacked Johnson Controls, a global manufacturer of HVAC and building automation systems. Cybercriminals encrypted servers, stole over 27 terabytes of sensitive data, and demanded a $51 million ransom. The attack paralyzed IT systems worldwide, and the leak included the company's security plans and operational information. This demonstrated that even elements not typically associated with cyberthreats, such as HVAC (heating, ventilation, and air conditioning) or the IoT (Internet of Things), a network of connected devices, can be entry points for serious cyberattacks.

How to protect yourself?

  • Restrict and control access for external partners
  • Segment the network and isolate IoT devices (e.g., HVAC)
  • Perform regular security tests
  • Monitor and respond to suspicious activity

What we, as an IT company, can offer:

  • Audit of your company's network infrastructure
  • Network segmentation into VLANs
  • Real-time monitoring using XDR, which allows for faster anomaly detection and attack blocking
  • Security testing

Example of an incident involving a surveillance system

In March 2021, Verkada, a manufacturer of surveillance systems, suffered a high-profile breach. The attack began with a misconfigured technical support server, allowing hackers to gain administrator privileges and gain access to approximately 4,500 cameras and access control systems at nearly 100 customers. Recordings, photos, user data, and ID card information were leaked. Worse still, some cameras were configured to allow for the viewing of passwords typed on employee keyboards. This demonstrates that even security tools can become a loophole for cybercriminals if they are not properly secured.

How to protect yourself? 

  • Use strong access authorization (MFA, roles, principle of least privilege)
  • Regularly audit the configuration of cameras and monitoring systems
  • Ensure that cameras cannot "see" confidential data, such as screens or keyboards

What we, as an IT company, can suggest:

  • Implement additional authorization and permission management
  • Real-time security monitoring (e.g., using XDR)
  • Network infrastructure audit

Summary:

The security of company equipment, such as CCTV cameras, network printers, smart home appliances, and air conditioning systems, requires a comprehensive approach.

Cameras are particularly vulnerable to attacks due to default passwords and software vulnerabilities. Printers, though often underestimated, can expose confidential data and become an attack vector. Smart devices can be used to send spam or spread ransomware, and air conditioning systems can be used to gain unauthorized access to the network.

So how can we mitigate the risk of an attack?

The most important elements include network segmentation and VLAN separation, strong and unique passwords, regular updates, security audits, activity monitoring, and employee education. This significantly reduces the risk of incidents and mitigates the impact of potential breaches.

If you'd like us to help secure your company, please contact us.

Team Support Online -
Related articles
Case study
| migrations and backups Case Study: Implementing Hardened Backup in Microsoft Azure. Read more
Article
| career Employee training and development in Support Online Read more
Article
| migrations and backups Veeam Hardened Repository – What is it and how does it protect backups against ransomware in 2026? Read more
Your IT.
our
support.
Contact us

The administrator of your personal data is Support Online sp. z o.o. Your personal data will be processed to respond to your inquiry and, if you consent, also to send the SOL newsletter. You can read about the detailed rules for personal data processing by our organization in our Privacy Policy.

FAQ

An IT company, or IT firm, deals with information technology in a broad sense. This includes, among other things:

  1. Software design and development: An IT company can create custom applications for other companies or software products for the mass market. Depending on their specialization, these can include mobile applications, desktop applications, web applications, or embedded systems.
  2. Consulting services: An IT company often provides experts to advise on implementing new technologies, optimizing business processes, or selecting appropriate technological solutions.
  3. Cloud solutions: Many IT companies specialize in implementing and managing cloud solutions, such as data storage, application hosting, and data analysis platforms.
  4. IT security: Protection against cyberattacks, security audits, implementing security policies, and network monitoring are just some of the IT companies' responsibilities in this area.
  5. IT infrastructure management: In this area, a company may manage servers, databases, networks, and endpoints.
  6. Technical Support and Service: An IT company may provide support for its own products or general IT support for other companies, managing their technology on a daily basis.
  7. Training: Many IT providers also offer training in software use and secure technology use.
  8. Hardware Solutions: Some IT companies may also provide and configure computer, server, or network hardware.

Depending on their specialization and size, an IT company may offer one, several, or all of the above solutions. When choosing a provider, it's important to thoroughly understand their services and tailor them to your individual needs.

At Support Online, we have been supporting companies for years with

  1. comprehensive user support (both on-site and remotely),
  2. we service computers, phones, tablets, and related network issues,
  3. we specialize in server administration: Windows, Linux/Unix,
  4. we support virtualizers such as KVM, Hyper-V, VMWare, and Proxmox,
  5. we support cloud services, particularly solutions such as Azure, Microsoft 365, and AWS,
  6. we monitor servers and devices on the internet,
  7. we consult on development, DRP, and support the stability of your business in the IT layer.

If you're looking for a good IT company, Support Online is the right place to grow your business.

It's worth using an IT company like Support Online when:

  1. You plan to implement new technologies or software in your company.
  2. You need specialized technology consulting.
  3. You want to optimize existing IT processes.
  4. You struggle with digital security issues.
  5. You need support in managing your IT infrastructure.
  6. You lack internal resources or expertise to implement certain technology projects.

Using external IT experts can bring benefits in terms of saving time and resources, and ensuring high-quality solutions.

Hiring an IT company like Support Online offers several key benefits over an IT freelancer:

  1. Support from the entire team: An IT company has a full team of specialists, from DevOps specialists and Cyber ​​Security Specialists to IT Helpdesk Specialists, who possess diverse skills and experience, enabling faster problem resolution and the implementation of more complex projects.
  2. Reliability and stability: IT companies have an established reputation and track record, which can translate into greater reliability and stability of services.
  3. Maintenance and support: An IT company can offer service contracts, warranties, and after-sales support, which may be more difficult to obtain from an individual freelancer.
  4. Resources: Companies have access to more resources, tools, and technologies that can accelerate and improve project execution.
  5. Long-term availability: The risk of a freelancer disappearing or changing careers is greater than the risk of a well-established company going out of business.

However, it's worth noting that the choice between a company and a freelancer depends on your specific needs and situation. If you value peace of mind and a quick response to unexpected problems, it is worth choosing an IT company such as Support Online.

Partnering with IT Support Online offers the following advantages:

  1. Professional IT outsourcing: The company guarantees high-quality IT outsourcing services for businesses of all sizes.
  2. Comprehensive IT support: IT Support Online provides comprehensive IT support that meets the diverse needs of businesses.
  3. Saves time and money: With our support, clients can focus on their core business activities while reducing the costs associated with information technology management.
  4. Serving a diverse range of businesses: The company specializes in serving both small and medium-sized enterprises and large corporations, demonstrating its flexibility and ability to adapt to diverse client needs.
  5. Leadership in IT outsourcing: The company is recognized as a leader in IT outsourcing, particularly in the Poznań and Warsaw regions.

By partnering with our company, IT Support Online, businesses can count on a high standard of service and professionalism at every stage of the relationship.

Free consultation
22 335 28 00