Smart Security for Smart Devices: Never Underestimate IoT Risks
Luca Bongiorni
???????????????? ???? ?????????????????????????? ?????? & ???????? | ?????????? ?? - ???????????????? ??- ?????? ?? - ?????? ?? Security {???????????????????? | ?????????????? | ???????????????? | ????????????????????}
In an era where our coffee makers, thermostats, and even door locks are connected to the internet, the convenience of Internet of Things (IoT) devices is undeniable. But with this convenience comes a new set of risks. As a hardware hacker that passed almost two decades breaking devices of any kind, I'm here to guide you through the potential pitfalls of consumer IoT devices and how to deal with them safely.
The Main Risks of Consumer IoT Devices
IoT devices have made our lives easier, but they also pose significant security risks, including:
Here are some real-world cases where IoT devices were attacked and exploited, impacting users:
Philips Device Vulnerabilities:
In 2021, Philips disclosed vulnerabilities in its TASY Electronic Medical Record (EMR) system and MRI software solutions, which could potentially expose confidential patient data. Additionally, vulnerabilities in its IoT medical device interface products, like the Patient Information Center iX (PIC iX) and Efficia CM Series, could allow access to patient data and enable denial of service attacks. Source:Finite State
Hotel Room Hacks:
Security consultant Kya Supa exploited vulnerabilities in a capsule hotel’s smart room system, controlled by an iPod touch. He was able to manipulate the lights, bed position, and ventilation in another guest's room. The hotel later fixed these vulnerabilities. Source:Finite State
Trend Micro Home Security Vulnerability:
In 2021, Cisco Talos researchers found vulnerabilities in Trend Micro's Home Network Security Station, a device intended to prevent hacking of internet-connected devices. The vulnerabilities could lead to denial of service attacks, privilege escalation, and code execution. Source:Finite State
Zoll Defibrillator Software Vulnerabilities:
In 2021, the Cybersecurity and Infrastructure Security Agency (CISA) found vulnerabilities in Zoll's defibrillator management software. These vulnerabilities could allow remote code execution and unauthorized access to credentials, impacting the confidentiality, integrity, and availability of the application. Source:Finite State
South Staffordshire PLC Cyberattack:
In 2022, South Staffordshire PLC, a UK water supplier, was targeted in a cyberattack. The attack did not impact their ability to supply safe water, but it highlighted the risk of threat actors accessing industrial control system environments. The Cl0p ransomware group claimed responsibility for this attack. Source: Microsoft Security Blog
IoT-Based Attacks Increase:
According to Nokia's 2023 Threat Intelligence Report, the number of IoT-based attacks, including DDoS attacks and data theft, increased five-fold over the past year. In one case, an insecure IoT device was exploited to launch a DDoS attack, disrupting services for thousands of users. Source: Electropages
These cases underscore the increasing sophistication of cyberattacks targeting IoT devices and the broad range of industries affected, from healthcare to hospitality and home security.
OWASP Top 10 IoT and Mitigation Strategies
The Open Web Application Security Project (OWASP) has identified the top ten security concerns for IoT [https://owasp.org/www-project-internet-of-things/], along with strategies to mitigate these risks:
Latest IoT Security Regulations in Europe
European governments are increasingly aware of the risks posed by IoT devices. A prime example is the United Kingdom's Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023 [https://www.legislation.gov.uk/ukdsi/2023/9780348249767]. These regulations set out clear expectations for manufacturers, importers, and distributors of consumer connectable products. Key aspects include:
These regulations represent a significant step towards ensuring the security and resilience of IoT devices and protecting consumers from potential threats.
WANNA BECOME A CERTIFIED HARDWARE HACKER?
The Offensive Hardware Hacking Training is a Self-Paced training including Videos, a printed Workbook and a cool Hardware Hacking Kit. And... you get everything shipped home Worldwide!
For more info: ? https://www.whid.ninja??