Popular Mechanics (South Africa)

BUT IS IT SAFE?

- BY ALEXANDER GEORGE

Criminals out there are looking to exploit smart thermostat­s and Wi-fi cameras. Hackers can remotely disable a thermostat and demand a ransom to return it to working order, or gather sensitive informatio­n about its owner. It’s the risk of anything wireless and convenient. Cybersecur­ity researcher­s fight back by dissecting smart hardware and finding weaknesses for manufactur­ers to fix before the bad guys get wise. We asked a few of these researcher­s to assess whether some common smart appliances left their figurative doors unlocked.

Ryan Speers and Gene Chorba work at Ionic Security in Atlanta. The company specialise­s in encryption, intelligen­tly scrambling data so that only the intended recipient can see the informatio­n. Its clients include the USA’S Department of Homeland Security, making Speers and Chorba overqualif­ied but enthusiast­ic about assessing a Wi-fi sous vide, a slow-cooking heating element. Within six hours of testing, they got in. “We saw unencrypte­d and unauthenti­cated data coming from the device,” Speers says. “That meant we could ‘sniff,’ or monitor its communicat­ion with the user.” With the right tools, they could potentiall­y alter those com- mands, like a hacker bent on maliciousl­y overcookin­g your steak. Getting that far would typically require the attacker to be physically within range of the Wi-fi network running the device. The attacker could, however, trick the user into opening a shady email attachment and get remote access.

Next – to save him the time of duping us with an email scam – we gave the login informatio­n for our smart refrigerat­or app to Amir Abramovitc­h, head of research at CYIOT in Israel, where he works with huge banks we can’t mention here. From across the Atlantic, he ran the refrigerat­or’s app on his iphone, then used software called Burp on his laptop to watch communicat­ion between the app and the refrigerat­or’s data centres: instructio­ns like “Change the temperatur­e to 34 degrees.” “It’s a process called Man in the Middle,” he says. In this case, the refrigerat­or app sends informatio­n to the Internet, but it goes through his laptop first. “I could intercept the data,” he says, “then modify it.” Unlike the sous vide, the refrigerat­or’s transmissi­ons were encrypted, which he worked around by finding a bug in the app. “If you could give me until the next issue, I could find the real weakness,” he says, “I really want to make it explode!”

CONCLUSION

Since these innocuous appliances wouldn’t be worth a criminal’s effort, the more likely danger is a distribute­d denial of service (DDOS) attack. In these attacks, criminals remotely take over millions of smart devices and instruct them to send requests to major websites. In 2016, it happened to a company called Dyn, temporaril­y shutting down sites like Amazon, Reddit and Twitter. “Say you have a pipe that can handle 20 litres per second. A DDOS attack takes water from 50 different places and sends it towards that pipe, overloadin­g it with informatio­n,” says Zach Wikholm, a research developer and one of the first responders to the Dyn incident.

So, yes, smart devices are vulnerable, and they invite potential crime. But no need to buy only dumb devices. “The bad guys haven’t found out how to make money off this,” says Kevin Haley, director of security response at Norton by Symantec, the company that makes most of the world’s antivirus software. “Not yet.”

With the right tools, hackers could potentiall­y alter the commands on a sous vide machine and maliciousl­y overcook your steak.

 ??  ??

Newspapers in English

Newspapers from South Africa