Internet of Things - Technology focus
42.9K views | +0 today
Follow
Internet of Things - Technology focus
Your new post is loading...
Your new post is loading...
Scooped by Richard Platt
Scoop.it!

The $10 Hardware Hack That Wrecks IoT Security

The $10 Hardware Hack That Wrecks IoT Security | Internet of Things - Technology focus | Scoop.it
Using an SD card reader and some soldering savvy, these hackers rooted out a ton of IoT zero days.
Richard Platt's insight:

Tinker, Hacker, Solder, Spy:  On many devices, all it takes to access everything stored on the flash memory chip is a $10 SD card reader, some wire, and some soldering experience. The researchers focus on a type of memory called eMMC flash, because they can access it cheaply and easily by connecting to just five pins (electrical connections). By soldering five wires to the chip—a command line, a clock line, a data line, a power line, and a ground—they can get read/write access that lets them exfiltrate data and start reprogramming to eventually control the whole device.  This process could theoretically work on any digital device that uses flash memory, but most types would require interfacing with more pins than eMMC does, and many necessitate specialized readers and protocols to gain access. "For the most common types of memory, most people don’t want to open things up, solder to them, do all that kind of stuff, because it’s kind of a giant mess," Heres says. "But with eMMC you can do it with five wires. Of course, the soldering is a little difficult, but totally doable. It’s not 40 or 50 wires." Some data recovery services already use that method to help customers retrieve their information from broken devices, but it isn't widely known.

No comment yet.
Scooped by Richard Platt
Scoop.it!

The internet of things and cybersecurity vulnerabilities - IoT Agenda

IoT creates cybersecurity vulnerabilities in every capacity, from homes to critical infrastructure. Cytellix's Brian Berger offers tips to help stay safe.
Richard Platt's insight:

Lastly, manufacturing sensors and devices are a common threat, as they are unmanaged. As seen with  Petya,  NotPetya  and WannaCry, unmanaged devices have been the target for spreading ransomware across networks. The attackers are looking for the easiest entry point and the sensors of unmanaged IoT devices, which have become active targets. Manufacturing under government contracts has been a key target and supply chain SMBs now have required guidance for compliance. Some of the most critical aerospace designs have been stolen through cyberattacks that have a significant effect on our national security, as well as the economy for lost programs from these smaller manufacturers, whereas in food safety, the monitoring and prevention of agroterrorism is paramount to protect our national food supply.  What should we do? The list of actions remains very similar. Make sure all devices are not set to default (i.e., change passwords) — this is a typical flaw in the devices of SMBs as well as consumer devices. Verify all devices and sensors are managed and monitored. Properly segment your network — create an internal, guest and IoT network at a minimum. Some other helpful considerations around a cybersecurity program include updating firewalls, securing remote access, reviewing security configurations, operating system updates and patches, training staff members, improving security policies and changing control procedures.

No comment yet.
Rescooped by Richard Platt from d@n3n
Scoop.it!

Analysis of data harvested by Kaspersky Lab’s IoT honeytraps

Analysis of data harvested by Kaspersky Lab’s IoT honeytraps | Internet of Things - Technology focus | Scoop.it

There were a number of incidents in 2016 that triggered increased interest in the security of so-called IoT or ‘smart’ devices. They included, among others, the record-breaking DDoS attacks against the French hosting provider OVH and the US DNS provider Dyn. These attacks are known to have been launched with the help of a massive botnet made up of routers, IP cameras, printers and other devices.


Via Danen Raas
No comment yet.
Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

Connected kettles boil over, spill Wi-Fi passwords over London

Connected kettles boil over, spill Wi-Fi passwords over London | Internet of Things - Technology focus | Scoop.it

A security man has mapped and hacked insecure connected kettles across London, proving they can leak WiFi passwords.

The iKettle is designed to save users precious seconds spent waiting for water to boil by allowing the kitchen staple to be turned on using a smartphone app.

Pen Test Partners bod Ken Munro says hackers can make more than a cuppa, however: armed with some social engineering data, a directional antenna, and some networking gear they can "easily" cause the iKettle to spew WiFi passwords.

"If you haven’t configured the kettle, it’s trivially easy for hackers to find your house and take over your kettle," Munro says. "Attackers will need to setup a malicious network with the same SSID but with a stronger signal that the iKettle connects to before sending a disassociation packet that will cause the device to drop its wireless link....


Via Jeff Domansky
Richard Platt's insight:

A security man has mapped and hacked insecure connected kettles across London, proving they can leak WiFi passwords.  The iKettle is designed to save users precious seconds spent waiting for water to boil by allowing the kitchen staple to be turned on using a smartphone app.  Pen Test Partners bod Ken Munro says hackers can make more than a cuppa, however: armed with some social engineering data, a directional antenna, and some networking gear they can "easily" cause the iKettle to spew WiFi passwords.  "If you haven’t configured the kettle, it’s trivially easy for hackers to find your house and take over your kettle," Munro says. "Attackers will need to setup a malicious network with the same SSID but with a stronger signal that the iKettle connects to before sending a disassociation packet that will cause the device to drop its wireless link....

Jeff Domansky's curator insight, October 28, 2015 2:38 PM

Great story about the potential security issues with IoT products. it highlights how did simple it is to hack devices that are poorly or not configured or password-protected. Who'd a thought? Invasion of the connected kettles?

Scooped by Richard Platt
Scoop.it!

This Guy Won $25,000 For a Brilliant App that May Never Get Made

Steve Castle entered the Federal Trade Commission’s “Internet of Things Home Inspector Challenge" and won with a brilliant idea for fighting consume
Richard Platt's insight:

The mobile app he proposed seeks to help users manage the IoT devices in their home. It would enable users with limited technical expertise to scan their home wifi and bluetooth networks to identify and inventory connected devices. It would flag devices with out-of-date software and other common vulnerabilities and provide instructions on how to update each device’s software and fix other vulnerabilities.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Preparing for the future by securing the Internet of Things 

The 2017 Black Hat cybersecurity conference has focused on the security of the Internet of Things. How can we secure these technologies moving forward?
Richard Platt's insight:

This year’s Black Hat presentations demonstrated potentially devastating attacks on the often cheaply-made, portable network-connected devices that make up the “Internet of Things,” or IoT. Hackers at the conference have shown how simple tools and attack techniques can exploit vulnerabilities in the inexpensive and unsecure designs of many IoT items. This means that simple, internet-enabled items like temperature gauges, smart TVs, game consoles, vacuums, or even refrigerators could give hackers access to an entire network’s operations. The cybersecurity risks of IoT devices have already been made readily apparent to the public, with the widespread internet disruption caused by a massive distributed denial-of-service (DDoS) attack in October 2016 that turned ordinary devices (like TV cameras and home routers) into weapons.  IoT devices are often vulnerable to attack because manufacturers want market friendly, inexpensive designs that consumers will want to adopt. Because security measures add complexity and cost to technology, they are omitted, especially as society has become accustomed to cheaper, simple-to-use devices. As the phrase “plug and play” demonstrates: You open the box, plug the device in; it connects to a network and starts operating.  To address this problem, security needs to be part of the manufacturing process to ensure a safely designed “thing” is available for consumers to purchase. There is a push by the security community to create “security by design,” or the practice of building security into the basic design of devices that will be attached to a network rather than trying to patch designs after they’ve been connected to the network.

No comment yet.
Rescooped by Richard Platt from d@n3n
Scoop.it!

IoT Security Testing Methodology | Rapid7

IoT Security Testing Methodology | Rapid7 | Internet of Things - Technology focus | Scoop.it

When examining IoT technology, the actionable testing focus and methodology is often applied solely to the embedded device. This is short sighted and incomplete. An effective assessment methodology should consider the entire IoT solution or as we refer to it, the IoT Product Ecosystem.


Via Danen Raas
Richard Platt's insight:

When examining IoT technology, the actionable testing focus and methodology is often applied solely to the embedded device. This is short sighted and incomplete. An effective assessment methodology should consider the entire IoT solution or as we refer to it, the IoT Product Ecosystem.

No comment yet.
Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security'

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security' | Internet of Things - Technology focus | Scoop.it

We've discussed at length that companies rushing to embrace the "Internet of Things" (read: networked devices for those of us not in marketing) tend to have completely forgotten a little something called device security. As a result we're now bombarded week after week with stories about cars that can be controlled remotely, televisions that share your unencrypted living room conversations with anybody on the Internet, and refrigerators that leave the door wide open to having your e-mail password stolen. Some of these are kind of cute exploits, but many of them could be potentially fatal.

While these companies are desperately trying to highlight the wonderful future of Internet connected devices, they've inadvertently been creating advertisements for why many devices should just remain stupid. Especially if you're going to cut corners in development so device security is an afterthought, or cut corners post release when it comes to quickly identifying and patching exploits.

The latest case in point: the $150 iKettle by UK company Smarter promises to save its users "two days a year in wasted waiting time" over traditional tea kettles. How? Users can remotely turn the kettle on from anywhere via smartphone app, potentially letting users walk into the house just as the kettle comes to a boil. Avoiding the horrible task of having to walk a few feet and wait a few minutes is the pinnacle of modern engineering to be sure; the problem is that for the better part of this year researchers have been noting that the security on the kettle was virtually nonexistent...


Via Jeff Domansky
Richard Platt's insight:

More detail on the tea kettle that can be hacked and understand how this thing called WiFi technology needs a bit more robustness to mitigate the threat of being hacked.  Read on.

Jeff Domansky's curator insight, October 28, 2015 2:33 PM

Here's a look inside the challenge of security for Internet of things products.