{"id":14928,"date":"2014-02-13T17:50:22","date_gmt":"2014-02-13T17:50:22","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1471"},"modified":"2020-02-27T03:39:52","modified_gmt":"2020-02-26T16:39:52","slug":"internet-of-things-vulnerability-and-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/internet-of-things-vulnerability-and-security\/14928\/","title":{"rendered":"Internet of Things: vulnerability and security"},"content":{"rendered":"<p>The Internet of Things is the latest term used to define all kinds of consumer electronics connected to the Internet \u2013 from refrigerators and washing machines to irons. Just like at the end of the last century, almost all computers in the world are connected to networks. Naturally, devices need to get smarter and become better equipped with their own computers so, for example, when a refrigerator detects a shortage of fresh greens or milk, it can send the relevant information by email to the nearest grocery store. Unfortunately, the presence of smart modules and network connections implies a very low probability that cybercriminals will not use these devices with the intent to cause harm.<\/p>\n<p>Actually, they have already tried, and quite successfully.<\/p>\n<p><b>Application refrigerator has encountered a problem and needs to close\u2026<\/b><\/p>\n<p>Many people will recognize the above subtitle text; a play on the late 1990s and early 2000s Windows messages that appeared during application errors. It\u2019s easy to imagine then what would have happened to a smart kitchen device running Windows 95, for instance.<\/p>\n<p>All joking aside; as recently as January 2014, a smart refrigerator was found spamming.<\/p>\n<p>More specifically, in the middle of the month, the security firm Proofpoint Inc. reported it had uncovered a spam campaign by a botnet, which <a href=\"http:\/\/www.npr.org\/blogs\/alltechconsidered\/2014\/01\/16\/263111193\/refrigerator-hacked-reveals-internet-of-things-security-gaps\" target=\"_blank\" rel=\"noopener nofollow\">consisted of not computers<\/a>, but compromised routers, multimedia centers, smart TVs and at least one refrigerator.<\/p>\n<p>Spamming was observed from Dec 23-Jan 6. Email messages were sent in groupings of 100,000, three times a day. At the same time each specific IP address did not send more than 10 messages in total, which further complicated the job of blocking the botnet.<\/p>\n<p>Attackers didn\u2019t have to make any special effort. In most cases, compromised appliances were badly connected to the network. Many default login and password pairs (admin\/password) were used. It was a real piece of cake.<\/p>\n<p>It was the first proven Internet of Things cyberattack. Experts had long warned that sooner or later, attackers would try to abuse the increasing intelligence of consumer electronics, and as you can see, they were right. Now these \u201cThingBots\u201d can send spam. Next time you may even expect them to launch a DDoS attack. I don\u2019t speak about chances here either, it is almost guaranteed. Just wait and see.<\/p>\n<p>There is a grimmer outlook with the growing number of so-called \u201cphysical\u201d attacks as well.<\/p>\n<p><b>Real forces<\/b><\/p>\n<p>By \u201cphysical\u201d attacks I am implying that they cause obvious material damage, and sometimes, colossal damage. They are still rare, but with the proliferation of the Internet of Things we have to expect the number of such attacks will grow.<\/p>\n<p>The most notorious example of late was the infamous Stuxnet, the cyberweapon virus designed to decommission uranium enrichment centrifuges (and it is well-known to have accomplished its mission).<\/p>\n<p>The Stuxnet and the concept of cyberweapon have already become a part of popular culture. For example, in the hugely popular U.S. TV series \u201cPerson of Interest\u201d, the Stuxnet is mentioned directly at least once. The subject of cyberweapons is also referred to several times.<\/p>\n<p>So let\u2019s assume that the Stuxnet is a phenomenon of complicated international relations. Thist still doesn\u2019t mean that commercial companies will not eventually become the targets of similar attacks. Regardless of their distance from politics, defense contracts or critical infrastructure facilities, the possibility of attacks have long and rightfully <a href=\"https:\/\/business.kaspersky.ru\/cybersecurity-framework-workshop-4-marketing-e-to-horosho-no-ne-dlya-inzhenerov\/\" target=\"_blank\" rel=\"noopener nofollow\">concerned professionals<\/a>.<\/p>\n<p>It\u2019s not hard to imagine attackers remotely disabling, for instance, the climate control system at a facility with strict temperature control rules or switching off (remotely again) the alarm system in an office building before armed men in ski masks enter.<\/p>\n<p>There may also be problems with automobile computers. Last year two experts demonstrated how to disable brakes and other systems in smart cars. And although the hack required a wired connection to the car\u2019s system, even earlier in 2010, other researchers <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/07\/24\/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video\/\" target=\"_blank\" rel=\"noopener nofollow\">had shown<\/a> the possibility of remote code execution in a vehicle\u2019s system via a wireless network. Thus, there is sufficient evidence that car systems can be vulnerable to external impacts and automakers are not always willing to tackle these problems.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/02\/06015919\/water.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-1476\" alt=\"water\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/02\/06015919\/water.jpg\" width=\"432\" height=\"289\"><\/a>At last year\u2019s BlackHat conference, various specialists <a href=\"https:\/\/business.kaspersky.ru\/security-digest-jul18-aug18\/\" target=\"_blank\" rel=\"noopener nofollow\">demonstrated<\/a> their ability to remotely attack the SCADA system of an oil-well pumping station, which could have had potentially catastrophic consequences. At the same conference there was also a report about Chinese cybertroops who diligently tried to hack a water plant in the U.S., specifically looking to steal documents and change the settings of pumps. However, it turned out that the plant was actually a decoy (honeypot), and all the actions of the attackers had been carefully logged. But the present security experts verified that hackers \u201cknew what they were doing.\u201d With this regard, the question arises whether attackers have already accessed similar systems in the U.S. and other countries, and what can stop them from inflicting a major accident when they need it.<\/p>\n<p>There is another very recent example too: using a drone with a WiFi transmitter and the necessary software to take over similar devices and hijack them. We have recently <a href=\"https:\/\/business.kaspersky.ru\/cybercriminal-exotica\/\" target=\"_blank\" rel=\"noopener nofollow\">written<\/a> on the subject. Perhaps, this is the most eloquent example of a physical attack \u2013 a phenomenon which is likely to become commonplace quite soon.<\/p>\n<p><b>What we missed<\/b><\/p>\n<p>The trend is quite clear. As the number of smart devices used by ordinary consumers and commercial companies grow, so will the number of new threats. A spamming refrigerator, a TV participating in a DDoS attack, an infected router forwarding every request to servers of cybercriminals (like DNSChanger did) \u2013 all of these examples are unpleasant, though hardly disastrous. The use of smart devices for cyber espionage <a href=\"http:\/\/mashable.com\/2013\/08\/02\/samsung-smart-tv-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">is already taking place<\/a>. An electronic master key to unlock any smart locks by Onity that is used in the hotel industry <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/05\/15\/hotel-lock-hack-still-being-used-in-burglaries-months-after-lock-firms-fix\/\" target=\"_blank\" rel=\"noopener nofollow\">is also real<\/a>.<\/p>\n<p>The problem is that while pursuing fashionable trends, producers of smart home appliances hastily adjusted their products to include new functionalities without taking into account the fact that new opportunities will also arise for misuse.<\/p>\n<p>By and large, history is repeating itself. More than two decades ago hardware and communication equipment manufacturers as well as software developers could hardly imagine anything like the notorious Code Red and SQL Slammer, both of which led to significant traffic slowdowns on the World Wide Web in 2001 and 2003. Accordingly, until thunder had started regular rattling, the security architecture itself was paid little attention to.<\/p>\n<div class=\"pullquote\">While pursuing fashionable trends, producers of smart home appliances hastily adjusted their products to include new functionalities without taking into account the fact that new opportunities will also arise for misuse.<\/div>\n<p>And here again it seems to be the same old story. The development of the Internet of Things is accelerating, security issues are being ignored and the opportunity to patch program shells <a href=\"http:\/\/www.wired.com\/opinion\/2014\/01\/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem\/\" target=\"_blank\" rel=\"noopener nofollow\">is not always provided<\/a>.<\/p>\n<p>According to Kaspersky Lab\u2019s latest survey, \u201cThe Threat Landscape in 2014\u201d, attackers today are not interested in causing massive epidemics of malware, but rather want to target money and valuable data extraction by exploiting vulnerabilities in IT perimeters of commercial companies.<\/p>\n<p>The Internet of Things, unless manufacturers of smart devices suddenly come to their senses and start taking care of security at all stages of production, is guaranteed to provide additional real life problems and not just information troubles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things is the latest term used to define all kinds of consumer electronics connected to the Internet \u2013 from refrigerators and washing machines to irons. Just like<\/p>\n","protected":false},"author":209,"featured_media":2773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[658,2070],"class_list":{"0":"post-14928","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-internet-of-things","10":"tag-security-vulnerabilities"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/internet-of-things-vulnerability-and-security\/14928\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/internet-of-things-vulnerability-and-security\/14928\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/internet-of-things-vulnerability-and-security\/14928\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/internet-of-things\/","name":"Internet of things"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=14928"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14928\/revisions"}],"predecessor-version":[{"id":26228,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14928\/revisions\/26228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/2773"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=14928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=14928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=14928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}