The Borneo Post

Watch out in a world of connected objects, cyber specialist­s warn

-

PARIS: The massive global cyber attack that wreaked havoc in computer systems earlier this month caused plenty of visible disruption, not least in Britain’s National Health Service.

But in the brave new inter- connected world heralded by the internet of things ( IoT), so- called ‘ransomware’ attacks could have as their source something quite mundane and yet present in ever more modern households.

In a not so far- off future, the source of a software glitch with serious consequenc­es for the simple consumer could be anything from a connected coffee machine or refrigerat­or to a techie toy or an outsmart-you television.

Web- connected gadgets are becoming all the rage with techaware profession­als.

But the mere idea that it only needs a hacker to give the software a malevolent tweak to send them on the blink with disastrous consequenc­es may yet threaten the developmen­t of such goods’ popular take-up.

“Regarding last weekend’s attack there is no risk for connected objects. That in particular hit systems running Windows...and today there are no mass market gadgets with Windows loaded in order to function,” says Gerome Billois, a consultant with Wavestone.

“In contrast, there have already been massive attacks on connected objects,” Billois told AFP.

The Mirai malware strain made from hacked IoT devices including badly secured routers and internet connected cameras recently infected hundreds of thousands of poorly secured connected objects.

The idea was not to stop them from working but to transform them into zombies or botnets with a view to using them as relay stations for future cyber attacks.

Last week at a timely cyber security conference in The Netherland­s, American wunderkind Reuben Paul, just 11, stunned an audience of security experts by hacking into a teddy bear via bluetooth to show how interconne­cted smart toys “can be weaponised”.

His prowess showed just how easy it is for tech savvy individual­s to use everyday objects to harvest data or use them as spy holes for covert surveillan­ce.

According to documents released in March by Wikileaks, US intelligen­ce can hack smartphone­s, computers and smart, web- connected TVs, to pilot them and eavesdrop.

“All the other connected objects can be pirated, that has been shown, be it a coffee machine, a refrigerat­or, a thermostat, electronic entry systems, the lighting system...,” warns Loic Guezo, a cyber security analyst for southern Europe with Japanese security software company Trend Micro.

Mikko Hypponen, head of research at Finnish security specialist­s F- Secure, has for his part come up with his eponymous Hypponen’s Law.

This states that “once a device is described as ‘intelligen­t’, you can consider it as vulnerable.”

The future might well spell connected cars - but they too are subject to potential remote hacking, the consequenc­es of which barely need stating.

When hackers lurking with their laptops have finished conjuring what havoc they might wreak on distant roads there are plenty of other things to which they could turn their attention.

Newspapers in English

Newspapers from Malaysia