기본 콘텐츠로 건너뛰기

Strange and scary IoT hacks


Here's the Thing …
It's no secret that the issue of IoT security is a Very Big Deal these days. Our brave new world of perpetually connected devices—appliances, cameras, thermostats, cars—has created a proportionately huge world of network security problems. The essential dilemma is that all these Internet-connected "smart" devices are often unprotected and easy to hack. Depending on the situation, they can leak sensitive data, generate worrisome surveillance problems, or even present legitimate physical dangers.
IoT security is an enormous, complicated, and really quite serious topic. Those in the market for in-depth analysis will want to consult our more sober assessments. Here we take a high-altitude POV, looking at IoT hacks that have made headlines in recent years, with an eye toward the weird, the funny, and the scary.
Everyone knows someone who doesn’t take the security of home appliances seriously enough. These are the stories you need to help them focus.
Botnet Trouble Since the earliest days of connected things, the most common IoT exploit has involved the hijacking of unsecured devices to power rampaging botnet armies. Using what amounts to forced virtual conscription, hackers take over thousands of connected devices, harnessing the collective computing power of all those machines to stage distributed denial-of-service (DDoS) attacks on websites and online services.
The IoT botnet trend spiked dramatically in 2016, when the infamous Mirai cyberattack on domain-name infrastructure temporarily stalled out multiple high-profile websites and online services, including Twitter, CNN, Reddit, and Netflix.
The outages were caused by a DDoS attack – a botnet assault – with a twist. This time around, the botnet was largely made up of innocent little IoT devices like televisions and home entertainment consoles. The attack was the most powerful of its type. Investigators estimated that hundreds of thousands of hijacked IoT devices were involved.
Child's Play In February 2017, reports surfaced of a rather disturbing IoT hacking incident. It seems the makers of CloudPets—a popular Internet-connected smart toy for kids—had left a giant database of user information unprotected online.
The account information included the email addresses and easily guessed passwords of more than 800,000 users, according to reports. What's more, security experts who assessed the flaw concluded that hackers could also access voice messages left between kids and their parents via the CloudPets toy. (CloudPets are basically voice messaging devices in the form of alarmingly cute stuffed animals.)
Things only got worse from there: Follow up investigations found that the stuffed animals themselves could potentially be turned into remote surveillance devices. Spooky!
Toy Stories If the CloudPets incident sounds familiar, that's because variations on this story have been popping up with regularity in recent years. Internet-connected toys are the same as any other Internet-connected device, from a security point of view. Add microphones and cameras to the mix and things get scary fast.
Maybe you've heard this urban legend: A suburban couple is awakened in the middle of the night by the sound of someone screaming obscenities in the baby room. Rushing through the door, they discover to their horror that someone has hacked in to the family baby monitor and camera system. The robotic camera, outfitted with motion-tracking features, looks up from berating the baby as the parents enter the room.
Unfortunately, it's no urban legend. This particular incident, which really happened back in 2014, is considered by many to be the patient-zero for scary toy hacking stories. In 2017, the FBI even got involved, issuing a consumer warning on Internet connected toys.
Car Talk Experts advise that we're in a critical early-warning phase, just now, with various IoT security crises lurking on the horizon. Click around online and you’ll find plenty of stories on anti-hacking conventions and security presentations in which experts demonstrate potential hacks that haven't yet occurred “in the wild.”
In 2015, one intrepid reporter took an admirably two-fisted, experimental approach to the issue of car hacking. Working with security experts Charlie Miller and Chris Valasek, Wired writer Andy Greenberg drove a Jeep down the highway at 70 mph while the good-guy hackers wirelessly hijacked his dashboard controls. The radio blared. The AC went full blast. The windshield wipers freaked out. Eventually, the engine cut out.
The delightfully creepy video of the experiment went viral, contributing to a growing demand for the auto industry to address the potential virtual carjacking dilemma.
Lateral Attacks What do businesses have to fear from IoT hacks? Funny you should ask. In a public demonstration at a recent security conference in San Francisco, officials laid out the specifics on how hackers can get to confidential business information via IoT mischief. The presentation showed how hackers could execute an IoT lateral attack—jumping from device to device to penetrate a corporate network.
In the demonstration scenario, hypothetical bad guys targeted a single office security camera using an IoT exploit already available in the darker corners of the Internet. The would-be hackers then jumped to a router, eventually getting access to all the building's cameras. By sifting through the camera feeds with image analysis software, the attackers were able to literally look over the shoulders of employees at their desks, grabbing up onscreen passwords and credential information.
This was a purely hypothetical situation, but security officials cautioned that such a scenario is entirely plausible using relatively simple tools on the market today.
Heart Trouble When contemplating a list of potentially hackable IoT devices, there are two words in particular that you really don't want to hear: surgically implantable.
In January of 2017, the U.S. Food and Drug Administration issued a statement warning that certain kinds of implantable cardiac devices—like pacemakers and defibrillators—could potentially be accessed by malicious hackers. Designed to send patient information to physicians working remotely, the devices connect wirelessly to a hub in the patient's home, which in turn connects to the Internet over standard landline or wireless connections. Unfortunately, technicians found that certain transmitters in the hub device were open to intrusions and exploits. Uh-oh.
In a worst-case scenario, hackers could fiddle with the virtual knobs and trigger incorrect shocks and pulses, or even just deplete the device's battery. Manufacturers quickly developed and deployed a software patch, so don't have a heart attack.
Hot in Here Here's another urban legend you may have heard: A jilted ex-husband, recently evicted from the family home, decides to get revenge on his ex-wife. When the missus is on vacation, he accesses the house smart thermostat and cranks up the heat for several days, exploding the utility bills. When she returns, he kills the heat at night, resulting in chilly 40-degree mornings.
As you may have guessed, this one isn't a legend either, although it’s a bit harder to verify. (The story unfolds on an infamous Amazon post from a few years back.) The story conjures a perennial IoT boogeyman, the danger of smart thermostats, and high-tech connected homes in general.
White-hat hackers have since uncovered various exploits around thermostat systems, even demonstrating a ransomware scenario where hackers could lock up your furnace until you pay up the extortion fee.
Insecurity Cameras Home webcams and unsecured security cameras have long been a favorite target of recreational hackers, pranksters, and voyeurs. With a few clicks, pretty much anyone can access a live video somewhere among the massive global network of unsecured cameras. You can even browse through directories listing open camera feeds, like Insecam.com. (There are, of course, less ethical directories, as well.)
Early last year, a pair of eastern European hackers were busted for taking partial control of two-thirds of the outdoor surveillance cameras in Washington, DC. The hackers demonstrated a peculiar kind of moxie by going after police cameras in America's capital city. Their timing wasn't great, though. Because the initial attack occurred just before President Trump's inauguration, the incident drew the attention of U.S. Secret Service.
As you may be aware, Secret Service agents do not, as a rule, mess around. The culprits were quickly tracked down in London, arrested and put in the queue for extradition. The hack had nothing to do with the inauguration, it turns out, and was instead part of a larger ransomware plot.
The Art of IoT Hacking Is there a bright side to the scourge of IoT hacking? Perhaps. Consider the curious case of the surveillance camera art exhibition.
Back in 2015, photographer Andrew Hammerand unveiled a photo collection comprised exclusively of images taken from a single hijacked security camera. Using a simple Google search, Hammerand found an unsecured website atop a cellular tower in the middle of an undisclosed American town. Using the camera's rotation and zoom controls, Hammerand spent a full year taking pictures of the tidy suburban town and its residents.
The low-resolution images are oddly compelling.  Hammerand was careful to obscure images to protect people's identity and privacy, and in fact the entire project was intended as an oblique commentary on surveillance state concerns. The photos are genuinely compelling, you can still see them at the Open Society Foundations Documentary Photography Project.

By Glenn McDonald | Monday, July 9, 2018 - 15:36

댓글

이 블로그의 인기 게시물

지문 넘어 정맥·홍채로...4000억원 '생체인증' 선점경쟁

4000억원 규모 국내 생체인증 시장을 선점하기 위해 관련 업체 경쟁이 치열하다. 생체인증시스템이 현금자동입출금기( ATM )부터 공항 신분확인, 기업 출입관리까지 다양한 분야로 확대된다. 지문인증을 넘어 손바닥, 손가락 정맥(장정맥, 지정맥)과 안면, 홍채 등 다양한 신체 부위를 활용한 인증 솔루션이 각광 받는다. 25일 업계에 따르면  Sh 수협은행은 장정맥 기반 금융서비스를  ATM 에 먼저 적용한다. 자체 기기에 도입하는 데 그치지 않고, 장정맥 인증 확산을 위해 타행· GS 리테일과 제휴도 추진한다.  GS 25 편의점 내  ATM 에서 장정맥 인증으로 입·출금, 계좌이체 등이 가능해진다. 신협중앙회는 손가락 정맥패턴을 이용한 '지정맥' 인증 시스템을 고객 간편결제 서비스에 도입하는 방안을 검토한다. 지난해 시스템 통제와 임직원 확인용 지정맥 인증을 사내 도입했다. 생체인증은 금융권 중심으로  ATM 과 개인금고, 공항, 기업 출입 등 다양한 곳에 활용된다. 한국후지쯔는 신한은행 시작으로 국민은행, 우리은행,  NH 증권, 롯데카드, 케이뱅크 등에 장정맥 인증 서비스 '팜시큐어'를 공급했다. 제주·김포공항에 장정맥을 이용한 실명확인 시스템을 구축했다. 동서석유화학,  SK 텔링크 등 일반 기업도 도입했다. LG 히다찌는 지정맥 인증 서비스를 신협중앙회 사내통제시스템뿐 아니라  BNK 부산은행 스마트  ATM 에도 공급했다. 부산은행은  ATM 뿐 아니라 은행창구 등에도 지정맥을 활용한다.  LG 히다찌는 신한카드, 나이스정보통신 등과 업무협약을 맺고 오프라인 간편결제로 지정맥 활용 준비 작업에 나섰다. 계명대 동산의료원과도 업무협약을 맺고 병원 인증시스템 도입도 검토한다. 국내 스타트업 위닝아이는 카메라를 이용한 손바닥 인증 기술을 전북은행 '뉴스마트뱅킹', 한화손해보험 '스마트인슈', 신영증권 등에 공급했다. 현대모비스와 손잡고 차량용 인증 기술 개...

BLACK LABEL, An IoT Security and Platform Company, Signed An MOU of Developing Security Solution for WDF Cryptocurrency

On June 21, 2018, Black Label Gangnam signed an MOU for the development of an integrated security solution for electronic wallets, servers and shopping malls to be issued by (re) the WDF cryptocurrency by the World Distribution Federation.  (re) The World Trade Federation, under the umbrella of the United Nations, is building a global distribution platform with more than 80 member countries around the world. On this platform, we are developing cryptography for the payment of funds for distribution and for the payment of shopping malls, and have developed this security solution in conjunction with the black label and signed a working agreement for integration. We are going to issue an IC card with the black label's patented pattern-free personal identification code (RSA +, BLACK LABEL's Patent Technology) and apply it to individuals ' electronic wallets, company servers, and shopping mall payment security.  The biggest problem with cryptography is the physical security of...

BLACK LABEL IoT SECURITY SOLUTION, MUTUAL VERIFICATION SYSTEM

Black Label's security solution is a mutual verification system, which is a personal identification security solution through mutual verification between SIM and identity authentication server. Among existing wireless communication networks, a mobile communication network using a USIM, which is a personal identification device, is considered to be most secure against hacking. This is because the USIM card has a personal identification code, including the user's mobile communication number, so it sends and receives a telephone call or message after authentication. BLACK LABEL has developed a security solution called "Mutual Verification System" by utilizing the characteristics of SIM and enhancing the disadvantages of the personal identification process to enhance the personal identification security. The mutual verification system is a system that sends and receives personally identifiable information to the authentication server by infinitely changing the i...