They continuously send and receive data via the internet and can be the easiest way for a hacker to access your home network.
IoT devices can spy on people, steal data, or bring down vast swathes of the internet, as happened in 2016 when Mirai malware infiltrated devices such as baby monitors and refrigerators and locked them into a botnet for the Dyn cyberattack. In March 2021, hackers gained access to a security company’s surveillance cameras and live-streamed those video feeds from hospitals, jails, schools, police stations, gyms, and even Tesla.
And here’s another shocking fact. After the 2015 cyberattack that disabled the power grid in parts of Ukraine, the U.S. Department of Homeland Security described IoT security as a matter of homeland security. They got that right, as proven by the massive cyberattack campaign that heralded the February Russian invasion of Ukraine.
IoT devices expose users to two main weaknesses. The first is the very well-known lack of device security. The other main weakness of IoT devices is the vast amounts of data that each one collects and sends.
Manufacturers assure us that they need the information to “improve products and customer satisfaction.” Therefore, we allow the devices to send information that may be highly personal, even downright intimate. It is easy to forget that our data will probably be warehoused and crunched by an external multi-million dollar data warehousing and analysis company, not the friendly, trustworthy folks at the customer service center.
Data has become a well-nigh priceless commodity, the cause of a never-ending Armageddon war between those who safeguard our masses of data and those who want it for nefarious purposes. In this ongoing war, some types of data storage are more prone to hacking because of the need to access, process, and analyze data quickly.
Out-of-date software or hardware or a supply network attack can allow malware onto a server. Opportunistic employees in sensitive positions can abuse network privileges to obtain sensitive information, use weak passwords, or accidentally respond to phishing. ‘Twas a simple phishing scam that brought Twitter down!
The inevitable result of collecting so much information is that data breaches are increasing.
A breach of the data from our conscientiously hyperactive fitbits, wearable medical devices, phones, computers, and fridges could translate into the spilling of monumental amounts of intimate data about our sleeping patterns, sex lives, fitness levels, and embarrassing medical conditions.
The other main weakness of IoT devices is that attackers can use them to get into your home network. Imagine your trusty fridge in bondage by malicious software, rigged as part of a botnet, and used as a slave device to take other networks down?
On a more serious note, an attacker could steal your identity and bank details from a coffee machine or take control of your other devices, phones, and computers is a vastly more frightening prospect.
We can’t cut off all IoT data transmissions, but there are still a few other ways to fight back. At the very least, we can ensure that we never send insecure data via the internet by taking the following three steps:
Stop buying insecure devices that have not been engineered with potential cybersecurity threats. Even one vulnerability can compromise your entire network.
Let’s work on the principle that if you have to supply data, you can at least make sure it gets to the intended, hopefully secure, data storage facility via a secure route.
With data breaches and data sale scandals abounding, consumers are starting to take a new look at user privacy. Why do IoT product manufacturers need so much data? Where do they send it? Who has access to the data? Educate yourself about the security of the information chain, and don’t be fobbed off with a cookie-cutter privacy statement that means absolutely nothing.
About the Author: Anas Baig
With a passion for working on disruptive products, Anas Baig is currently working as a Product Lead at the Silicon Valley based company – Securiti.ai. He holds a degree of Computer Science from Iqra University and specializes in Information Security & Data Privacy.
Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, IoT)
[adrotate banner=”5″]
[adrotate banner=”13″]