Of Fridges and Pacemakers: The Pervasive Vulnerabilities of the Internet of Things (1/2)

 

The Problem

In January, the Wired magazine published an essay, in which cyber security guru Bruce Schneier warned about the security risks of the Internet of Things (IoT).  “Riddled with vulnerabilities,” information technology (IT) embedded in all kinds of appliances at home, in the public, in cars, or even in our bodies allows hackers to access such systems at much less cost compared to our personal computers, which are often well protected and regularly updated in terms of security.

This post is the first of two parts. Today, I will sketch out the phenomenology of these IoT specific vulnerabilities, blogging about incidents that have illustrated their presence and give an idea of their future potential. Tomorrow, I will cover the political considerations. Following Schneier’s argument on the causes of this problem and his prescription, I will outline first responses of the private sector.

 

Its Manifestations

Schneier referred to routers and modems as a primary target, as they are

(1) between users and the Internet, so turning them off is increasingly not an option;

(2) more powerful and more general in function than other embedded devices;

(3) the one 24/7 computing device in the house […].

 

Accordingly, Fabio Assolini of Kaspersky Labs reviewed the 2011 hacking of more than 4.5 million home DSL routers in Brazil on securelist.com. Cyber criminals remotely accessed unprotected ADSL modems and changed their configurations in a way that directed traffic to malicious domain name servers (DNS). Instead of the (correctly entered) web address, the router took affected users to a destination that only pretended to be the desired (and correctly requested) homepage, tricking them into entering financially sensitive information.

2 weeks ago, a similar incident has been reported by the Polish Computer Emergency Response Team (CERT Polska). In late 2013, the country’s cyber watch started to investigate what they found to be a “[l]arge-scale DNS redirection on home routers for financial theft,” the same kind of attack that has occurred in Brazil, and which is commonly referred to DNS hijacking.

But Schneier’s argument is not restricted to routers,

[a]s the Internet — as well as our homes and bodies — becomes flooded with new embedded devices that will be equally poorly maintained and unpatchable.

 

Only ten days after Schneier’s publication, cyber security company Proofpoint, Inc. announced the detection of a cyber attack that hacked more than 100,000 electronic devices. Refrigerators and TVs, among others, sent out at least 750,000 spam and phishing emails with the purpose to install malicious software and extract sensitive information. The company’s researchers uncovered “what may be the first proven Internet of Things (IoT)-based cyber attack involving conventional household ‘smart’ appliances.” According to Schneier, “there’s no good way to patch them.” Fridges and cars are not (yet) equipped with firewalls and anti-virus software.

Moreover, for the Black Hat Asia technical information security conference scheduled at the end of March 2014 in Singapore, two Spanish researchers announced to demonstrate how they will hack a car and take over control “just by hooking four wires,” using a custom made tool that costs less than 20 US Dollars.

And finally, as early as 2008, the Wired magazine published an article headlined “Scientists Demonstrate Deadly WiFi Pacemaker Hack.” Long before Showtime’s polit-thriller TV show “Homeland” introduced that kind of cyber attack to its audience two years ago, and Dick Cheney told CBS last year how, in order to prevent potential assassination, he had his doctors disable the WiFi function of his pacemaker when he got it implanted, these news already gave a taste of the pervasive vulnerabilities of the IoT.

 

Tune in tomorrow to find out about the causes of the problem, what could be done, and what is currently done about it.

 

Please follow and like us:
error

Tags: , , , , ,

One Response to “Of Fridges and Pacemakers: The Pervasive Vulnerabilities of the Internet of Things (1/2)”

  1. […] Yesterday’s blog post raised awareness on the insecurities of the Internet of Things (IoT). Widespread vulnerabilities make all kinds of “smart” devices an easily accessible and controllable target for hackers and cyber criminals. Several examples of cyber attacks on such embedded systems have been mentioned to substantiate security expert Bruce Schneier’s problem statement. […]

Leave a Reply

You must be logged in to post a comment.

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories

RSS
Follow by Email
Facebook
LinkedIn