Search
  • Central Europe
  • Middle East
  • Scandinavia
  • Africa
  • UK
  • Italy
  • Spain
  • more
    • Estonia
    • European Union
    • Mobility
    • Hardware
    • Innovation
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Central Europe
    • Middle East
    • Scandinavia
    • Africa
    • UK
    • Italy
    • Spain
    • Estonia
    • European Union
    • Mobility
    • Hardware
    • Innovation
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • eu
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The biggest Internet of Things, smart home hacks of 2019

7 of 14 NEXT PREV
  • The Internet of Things (IoT) and security in 2019

    The Internet of Things (IoT) and security in 2019

    As more and more devices become smart and Internet-connected, the risk of cyberattacks increase. Even with a low-powered Internet of Things (IoT) lightbulb or doorbell, enough open ports and hardcoded credentials can turn seemingly harmless devices into a botnet army capable of taking down major services. 

    Sometimes the risk to IoT products, including routers, smartphones, and home gadgets, is down to our individual failures to update and use strong credentials. In other cases, vendors consider security an afterthought. Either way, now millions of new devices are now online, we are faced with a minefield of new cybersecurity issues. 

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • All types and all kinds

    All types and all kinds

    SAM Seamless Network has published a report on the IoT devices -- US households containing an average of 17 smart devices while EU homes have roughly 14 devices -- most likely to come under attack. TVs, kitchen appliances, and lighting are often targeted, but security cameras now make up 47% of vulnerable devices.

    Read on: Cybersecurity: These are the Internet of Things devices that are most targeted by hackers

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Bashlite

    Bashlite

    Bashlite malware detections are relatively rare, but in 2019 researchers stumbled across an updated version able to not only target IoT products using default, hardcoded credentials, but also Belkin WeMo home automation switches and any smart device that supports the Belkin WeMo UPnP SDK.

    Read on: Bashlite IoT malware upgrade lets it target WeMo home automation devices

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Silex malware

    Silex malware

    In June, a new strain of malware called Silex appeared on the scene. During its debut, the IoT malware was able to brick thousands of devices. The hacker responsible is thought to be a 14-year-old teenager.

    Read on: New Silex malware is bricking IoT devices, has scary plans

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Urgent/11

    Urgent/11

    Only a month after, researchers disclosed a batch of 11 vulnerabilities in VxWorks, an operating system used by over two billion connected devices. If exploited, the bugs could be harnessed for information leaks, crashing, and device hijacking.

    Read on: Urgent/11 security flaws impact routers, printers, SCADA, and many IoT devices

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Insulin pumps

    Insulin pumps

    In July, the FDA warned that Internet-connected Medtronic MiniMed insulin pumps were potentially vulnerable to attack. The pumps, used to administer insulin to patients with diabetes, contained vulnerabilities that could be exploited to over-deliver insulin, or stop insulin delivery altogether. 

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Set-top box attacks

    Set-top box attacks

    In August, a new IoT botnet emerged which specializes in infecting Android devices and set-top boxes by exploiting Android Debug Bridge, a testing feature that may accidentally be left open on connected devices. Set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia are on the target list.

    Read on: A new IOT botnet is infecting Android-based set-top boxes

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Backdoors in IoT radios

    Backdoors in IoT radios

    Telestar Digital GmbH Internet of Things (IoT) products were found to contain an undocumented Telnet service on Port 23 that could be accessed externally, leading to remote system hijacking. Over a million IoT devices are believed to be affected. 

    Read on: Telnet backdoor vulnerabilities impact over a million IoT radio devices

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Gas pumps

    Gas pumps

    Keeping an eye on underground forums where discussions of black hat hacking take place can lead to some interesting discoveries. In September, researchers found that Internet-connected gas pumps and the ways to abuse them in the quest to cause destruction or get free fuel are now a hot topic. Tutorials and step-by-step guides have been published. 

    Read on: IoT security: Now dark web hackers are targeting internet-connected gas pumps

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Data leaks from your television set

    Data leaks from your television set

    Research published in September suggested that our smart TVs, including those manufactured by Samsung, Apple, and LG, are sending information from our sets to companies including Google, Apple, and Netflix -- even when the devices are idle. Information leaked included models, IP addresses, and locations.

    Read on: Smart TVs send user data to tech heavyweights including Facebook, Google, Netflix

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Satori

    Satori

    Satori, an infamous botnet used to enslave IoT devices, routers, and more, has been a thorn in the side of cybersecurity defenders. In September, the 21-year-old creator of the botnet pleaded guilty and he now faces up to ten years behind bars. 

    Read on: Author of multiple IoT botnets pleads guilty

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Smart voice assistant snooping

    Smart voice assistant snooping

    Over a year after first being reported, Google and Amazon failed to address security concerns connected to the Alexa and Google Home voice assistant devices. Researchers were able to demonstrate ways to conduct phishing attacks through the IoT products.

    Read on: Alexa and Google Home devices leveraged to phish and eavesdrop on users, again

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Gafgyt

    Gafgyt

    A new variant of Gafgyt has been weaponized this year to create a new, IoT-based botnet. The malware has been spotted targeting routers and also replacing rival botnet code -- such as JenX -- with its own malicious offering. 

    Read on: This aggressive IoT malware is forcing Wi-Fi routers to join its botnet army

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

  • Hackers can overfeed your cat

    Hackers can overfeed your cat

    In a form of attack that would likely be appreciated by our cats everywhere, in October, a researcher was accidentally able to take over all FurryTail pet feeders located across the world. Over 10,000 devices were viewable and the researcher said she could tamper with feeding schedules without authentication.

    Read on: Security researcher gets access to all FurryTail pet feeders around the world

    Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

    Caption by: Charlie Osborne

7 of 14 NEXT PREV
Charlie Osborne

By Charlie Osborne for Zero Day | December 20, 2019 -- 13:26 GMT (13:26 GMT) | Topic: Security

  • The Internet of Things (IoT) and security in 2019
  • All types and all kinds
  • Bashlite
  • Silex malware
  • Urgent/11
  • Insulin pumps
  • Set-top box attacks
  • Backdoors in IoT radios
  • Gas pumps
  • Data leaks from your television set
  • Satori
  • Smart voice assistant snooping
  • Gafgyt
  • Hackers can overfeed your cat

Attackers targeted everything from gas pumps to your smart TV this year.

Read More Read Less

Set-top box attacks

In August, a new IoT botnet emerged which specializes in infecting Android devices and set-top boxes by exploiting Android Debug Bridge, a testing feature that may accidentally be left open on connected devices. Set-top boxes manufactured by HiSilicon, Cubetek, and QezyMedia are on the target list.

Read on: A new IOT botnet is infecting Android-based set-top boxes

Published: December 20, 2019 -- 13:26 GMT (13:26 GMT)

Caption by: Charlie Osborne

7 of 14 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne for Zero Day | December 20, 2019 -- 13:26 GMT (13:26 GMT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 2
  • The most dangerous iOS, Android malware and smartphone vulnerabilities of 2019

    Malware which resists removal to covert spying on locked smartphones -- mobile threats are becoming more complex and dangerous with each year that passes. ...

  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

ZDNet
Connect with us

© 2020 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • CA Privacy/Info We Collect
  • CA Do Not Sell My Info
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums