Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The biggest Internet of Things, smart home hacks of 2019

2 of 14 NEXT PREV
  • The Internet of Things (IoT) and security in 2019

    The Internet of Things (IoT) and security in 2019

    As more and more devices become smart and Internet-connected, the risk of cyberattacks increase. Even with a low-powered Internet of Things (IoT) lightbulb or doorbell, enough open ports and hardcoded credentials can turn seemingly harmless devices into a botnet army capable of taking down major services. 

    Sometimes the risk to IoT products, including routers, smartphones, and home gadgets, is down to our individual failures to update and use strong credentials. In other cases, vendors consider security an afterthought. Either way, now millions of new devices are now online, we are faced with a minefield of new cybersecurity issues. 

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • All types and all kinds

    All types and all kinds

    SAM Seamless Network has published a report on the IoT devices -- US households containing an average of 17 smart devices while EU homes have roughly 14 devices -- most likely to come under attack. TVs, kitchen appliances, and lighting are often targeted, but security cameras now make up 47% of vulnerable devices.

    Read on: Cybersecurity: These are the Internet of Things devices that are most targeted by hackers

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Bashlite

    Bashlite

    Bashlite malware detections are relatively rare, but in 2019 researchers stumbled across an updated version able to not only target IoT products using default, hardcoded credentials, but also Belkin WeMo home automation switches and any smart device that supports the Belkin WeMo UPnP SDK.

    Read on: Bashlite IoT malware upgrade lets it target WeMo home automation devices

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Silex malware

    Silex malware

    In June, a new strain of malware called Silex appeared on the scene. During its debut, the IoT malware was able to brick thousands of devices. The hacker responsible is thought to be a 14-year-old teenager.

    Read on: New Silex malware is bricking IoT devices, has scary plans

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Urgent/11

    Urgent/11

    Only a month after, researchers disclosed a batch of 11 vulnerabilities in VxWorks, an operating system used by over two billion connected devices. If exploited, the bugs could be harnessed for information leaks, crashing, and device hijacking.

    Read on: Urgent/11 security flaws impact routers, printers, SCADA, and many IoT devices

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Insulin pumps

    Insulin pumps

    In July, the FDA warned that Internet-connected Medtronic MiniMed insulin pumps were potentially vulnerable to attack. The pumps, used to administer insulin to patients with diabetes, contained vulnerabilities that could be exploited to over-deliver insulin, or stop insulin delivery altogether. 

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Set-top box attacks

    Set-top box attacks

    In August, a new IoT botnet emerged which specializes in infecting Android devices and set-top boxes by exploiting Android Debug Bridge, a testing feature that may accidentally be left open on connected devices. Set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia are on the target list.

    Read on: A new IOT botnet is infecting Android-based set-top boxes

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Backdoors in IoT radios

    Backdoors in IoT radios

    Telestar Digital GmbH Internet of Things (IoT) products were found to contain an undocumented Telnet service on Port 23 that could be accessed externally, leading to remote system hijacking. Over a million IoT devices are believed to be affected. 

    Read on: Telnet backdoor vulnerabilities impact over a million IoT radio devices

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Gas pumps

    Gas pumps

    Keeping an eye on underground forums where discussions of black hat hacking take place can lead to some interesting discoveries. In September, researchers found that Internet-connected gas pumps and the ways to abuse them in the quest to cause destruction or get free fuel are now a hot topic. Tutorials and step-by-step guides have been published. 

    Read on: IoT security: Now dark web hackers are targeting internet-connected gas pumps

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Data leaks from your television set

    Data leaks from your television set

    Research published in September suggested that our smart TVs, including those manufactured by Samsung, Apple, and LG, are sending information from our sets to companies including Google, Apple, and Netflix -- even when the devices are idle. Information leaked included models, IP addresses, and locations.

    Read on: Smart TVs send user data to tech heavyweights including Facebook, Google, Netflix

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Satori

    Satori

    Satori, an infamous botnet used to enslave IoT devices, routers, and more, has been a thorn in the side of cybersecurity defenders. In September, the 21-year-old creator of the botnet pleaded guilty and he now faces up to ten years behind bars. 

    Read on: Author of multiple IoT botnets pleads guilty

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Smart voice assistant snooping

    Smart voice assistant snooping

    Over a year after first being reported, Google and Amazon failed to address security concerns connected to the Alexa and Google Home voice assistant devices. Researchers were able to demonstrate ways to conduct phishing attacks through the IoT products.

    Read on: Alexa and Google Home devices leveraged to phish and eavesdrop on users, again

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Gafgyt

    Gafgyt

    A new variant of Gafgyt has been weaponized this year to create a new, IoT-based botnet. The malware has been spotted targeting routers and also replacing rival botnet code -- such as JenX -- with its own malicious offering. 

    Read on: This aggressive IoT malware is forcing Wi-Fi routers to join its botnet army

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

  • Hackers can overfeed your cat

    Hackers can overfeed your cat

    In a form of attack that would likely be appreciated by our cats everywhere, in October, a researcher was accidentally able to take over all FurryTail pet feeders located across the world. Over 10,000 devices were viewable and the researcher said she could tamper with feeding schedules without authentication.

    Read on: Security researcher gets access to all FurryTail pet feeders around the world

    Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

    Caption by: Charlie Osborne

2 of 14 NEXT PREV
Charlie Osborne

By Charlie Osborne for Zero Day | December 20, 2019 -- 13:26 GMT (05:26 PST) | Topic: Security

  • The Internet of Things (IoT) and security in 2019
  • All types and all kinds
  • Bashlite
  • Silex malware
  • Urgent/11
  • Insulin pumps
  • Set-top box attacks
  • Backdoors in IoT radios
  • Gas pumps
  • Data leaks from your television set
  • Satori
  • Smart voice assistant snooping
  • Gafgyt
  • Hackers can overfeed your cat

Attackers targeted everything from gas pumps to your smart TV this year.

Read More Read Less

All types and all kinds

SAM Seamless Network has published a report on the IoT devices -- US households containing an average of 17 smart devices while EU homes have roughly 14 devices -- most likely to come under attack. TVs, kitchen appliances, and lighting are often targeted, but security cameras now make up 47% of vulnerable devices.

Read on: Cybersecurity: These are the Internet of Things devices that are most targeted by hackers

Published: December 20, 2019 -- 13:26 GMT (05:26 PST)

Caption by: Charlie Osborne

2 of 14 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne for Zero Day | December 20, 2019 -- 13:26 GMT (05:26 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums