/>
X

The biggest Internet of Things, smart home hacks of 2019

Attackers targeted everything from gas pumps to your smart TV this year.

|
charlie-osborne.jpg
|
Topic: Security
screenshot-2019-11-20-at-13-23-49.png
1 of 14 Charlie Osborne/ZDNet

The Internet of Things (IoT) and security in 2019

As more and more devices become smart and Internet-connected, the risk of cyberattacks increase. Even with a low-powered Internet of Things (IoT) lightbulb or doorbell, enough open ports and hardcoded credentials can turn seemingly harmless devices into a botnet army capable of taking down major services. 

Sometimes the risk to IoT products, including routers, smartphones, and home gadgets, is down to our individual failures to update and use strong credentials. In other cases, vendors consider security an afterthought. Either way, now millions of new devices are now online, we are faced with a minefield of new cybersecurity issues. 

2.jpg
2 of 14 Charlie Osborne/ZDNet

All types and all kinds

SAM Seamless Network has published a report on the IoT devices -- US households containing an average of 17 smart devices while EU homes have roughly 14 devices -- most likely to come under attack. TVs, kitchen appliances, and lighting are often targeted, but security cameras now make up 47% of vulnerable devices.

Read on: Cybersecurity: These are the Internet of Things devices that are most targeted by hackers

1.jpg
3 of 14 Charlie Osborne/ZDNet

Bashlite

Bashlite malware detections are relatively rare, but in 2019 researchers stumbled across an updated version able to not only target IoT products using default, hardcoded credentials, but also Belkin WeMo home automation switches and any smart device that supports the Belkin WeMo UPnP SDK.

Read on: Bashlite IoT malware upgrade lets it target WeMo home automation devices

3.jpg
4 of 14 Charlie Osborne/ZDNet

Silex malware

In June, a new strain of malware called Silex appeared on the scene. During its debut, the IoT malware was able to brick thousands of devices. The hacker responsible is thought to be a 14-year-old teenager.

Read on: New Silex malware is bricking IoT devices, has scary plans

4.jpg
5 of 14 Charlie Osborne/ZDNet

Urgent/11

Only a month after, researchers disclosed a batch of 11 vulnerabilities in VxWorks, an operating system used by over two billion connected devices. If exploited, the bugs could be harnessed for information leaks, crashing, and device hijacking.

Read on: Urgent/11 security flaws impact routers, printers, SCADA, and many IoT devices

screenshot-2019-11-26-at-16-34-40.png
6 of 14 Charlie Osborne/ZDNet

Insulin pumps

In July, the FDA warned that Internet-connected Medtronic MiniMed insulin pumps were potentially vulnerable to attack. The pumps, used to administer insulin to patients with diabetes, contained vulnerabilities that could be exploited to over-deliver insulin, or stop insulin delivery altogether. 

5.jpg
7 of 14 Charlie Osborne/ZDNet

Set-top box attacks

In August, a new IoT botnet emerged which specializes in infecting Android devices and set-top boxes by exploiting Android Debug Bridge, a testing feature that may accidentally be left open on connected devices. Set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia are on the target list.

Read on: A new IOT botnet is infecting Android-based set-top boxes

6.jpg
8 of 14 Charlie Osborne/ZDNet

Backdoors in IoT radios

Telestar Digital GmbH Internet of Things (IoT) products were found to contain an undocumented Telnet service on Port 23 that could be accessed externally, leading to remote system hijacking. Over a million IoT devices are believed to be affected. 

Read on: Telnet backdoor vulnerabilities impact over a million IoT radio devices

7.jpg
9 of 14 Charlie Osborne/ZDNet

Gas pumps

Keeping an eye on underground forums where discussions of black hat hacking take place can lead to some interesting discoveries. In September, researchers found that Internet-connected gas pumps and the ways to abuse them in the quest to cause destruction or get free fuel are now a hot topic. Tutorials and step-by-step guides have been published. 

Read on: IoT security: Now dark web hackers are targeting internet-connected gas pumps

8.jpg
10 of 14 Charlie Osborne/ZDNet

Data leaks from your television set

Research published in September suggested that our smart TVs, including those manufactured by Samsung, Apple, and LG, are sending information from our sets to companies including Google, Apple, and Netflix -- even when the devices are idle. Information leaked included models, IP addresses, and locations.

Read on: Smart TVs send user data to tech heavyweights including Facebook, Google, Netflix

screenshot-2019-11-26-at-16-36-12.png
11 of 14 Charlie Osborne/ZDNet

Satori

Satori, an infamous botnet used to enslave IoT devices, routers, and more, has been a thorn in the side of cybersecurity defenders. In September, the 21-year-old creator of the botnet pleaded guilty and he now faces up to ten years behind bars. 

Read on: Author of multiple IoT botnets pleads guilty

9.jpg
12 of 14 Charlie Osborne/ZDNet

Smart voice assistant snooping

Over a year after first being reported, Google and Amazon failed to address security concerns connected to the Alexa and Google Home voice assistant devices. Researchers were able to demonstrate ways to conduct phishing attacks through the IoT products.

Read on: Alexa and Google Home devices leveraged to phish and eavesdrop on users, again

10.jpg
13 of 14 Charlie Osborne/ZDNet

Gafgyt

A new variant of Gafgyt has been weaponized this year to create a new, IoT-based botnet. The malware has been spotted targeting routers and also replacing rival botnet code -- such as JenX -- with its own malicious offering. 

Read on: This aggressive IoT malware is forcing Wi-Fi routers to join its botnet army

12.jpg
14 of 14 Charlie Osborne/ZDNet

Hackers can overfeed your cat

In a form of attack that would likely be appreciated by our cats everywhere, in October, a researcher was accidentally able to take over all FurryTail pet feeders located across the world. Over 10,000 devices were viewable and the researcher said she could tamper with feeding schedules without authentication.

Read on: Security researcher gets access to all FurryTail pet feeders around the world

Related Galleries

Yubikey Security Key C NFC
Security Key C NFC

Related Galleries

Yubikey Security Key C NFC

8 Photos
First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

10 Photos
iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

5 Photos
OnlyKey hardware security key
OnlyKey

Related Galleries

OnlyKey hardware security key

19 Photos
SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

10 Photos
iVerify: Added security for iPhone and iPad users
iVerify

Related Galleries

iVerify: Added security for iPhone and iPad users

9 Photos
iStorage datAshur BT hardware encrypted flash drive
iStorage datAshur BT

Related Galleries

iStorage datAshur BT hardware encrypted flash drive

18 Photos