* Smart-TV’s and Refrigerators can Be Used to Attack Businesses

TechViews News   …..

We all remember last October’s massive Internet hack using ordinary household Internet connected devices. The Internet of Things (IoT) is becoming more and more a favorite tool of hackers.

Those devices which ranged from webcams, to security systems, to home appliances, were victims to the Mirai bug. This bug was easily planted because homeowners seldom change the passwords or log-in credentials of ordinary household appliances.

But many people are still scratching their heads…. ‘Can my baby monitor or my refrigerator actually bring down the Internet?’

While IT experts have long predicted security risks associated with the rapidly proliferating Internet of Things (IoT), this is the first time the industry has reported actual proof of such a cyber-attack involving common appliances. And now with the Mirai attack in October 2016, the methodology has gone mainstream.

Using security analytics software researchers at Proofpoint were able to reveal the very first wide-scale hack that involved television sets and at least one refrigerator.

The attack that Proofpoint identified and profiled occurred between December 23, 2013 and January 6, 2014, and featured waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting enterprises and individuals worldwide.

More than 25 percent of the volume was sent by things that were not conventional laptops, desktop computers or mobile devices; instead, the emails were sent by everyday consumer gadgets such as compromised home-networking routers, connected multi-media centers, televisions and at least one refrigerator.

No more than 10 emails were initiated from any single IP address, making the attack difficult to block based on location — and in many cases, the devices had not been subject to a sophisticated compromise; instead, misconfiguration and the use of default passwords left the devices completely exposed on public networks, available for takeover and use.

The global attack campaign involved more than 750,000 malicious email communications coming from more than 100,000 everyday consumer gadgets that had been compromised and used as a platform to launch attacks.

Just as personal computers can be unknowingly compromised to form robot-like “botnets” that can be used to launch large-scale cyberattacks, Proofpoint said its findings reveal that cyber criminals have begun to commandeer home routers, smart appliances and other components of the Internet of Things and transform them into “thingbots” to carry out the same type of malicious activity.

“Bot-nets are already a major security concern and the emergence of thingbots may make the situation much worse,” said David Knight, General Manager of Proofpoint’s Information Security division. “Many of these devices are poorly protected at best and consumers have virtually no way to detect or fix infections when they do occur. Enterprises may find distributed attacks increasing as more and more of these devices come on-line and attackers find additional ways to exploit them.”

“The ‘Internet of Things’ holds great promise for enabling control of all of the gadgets that we use on a daily basis. It also holds great promise for cybercriminals who can use our homes’ routers, televisions, refrigerators and other Internet-connected devices to launch large and distributed attacks,” said Michael Osterman, principal analyst at Osterman Research.

“Internet-enabled devices represent an enormous threat because they are easy to penetrate, consumers have little incentive to make them more secure, the rapidly growing number of devices can send malicious content almost undetected, few vendors are taking steps to protect against this threat, and the existing security model simply won’t work to solve the problem.”

Be Safe – Backup Your Data Regularly!

**********

And don’t forget to take advantage of our FREE subscription to the TechViews.org Newsletter. A must-read if you are interested in Internet Security.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s