/>
X

The worst IoT, smart home hacks of 2020 (so far)

Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.

|
charlie-osborne.jpg
|
Topic: Security
10.jpg
1 of 6 Charlie Osborne/ZDNet

Shadow IoT devices

Researchers warned at the start of 2020 that the emergence of 'shadow IoT devices' -- such as employee devices connected to corporate networks without the knowledge of IT teams -- are putting organizations at serious risk. 

Fitness trackers, smartwatches, and medical devices are only some of many IoT endpoints that can be exploited to gain a foothold into corporate networks.  

Via: ZDNet

11.jpg
2 of 6 Charlie Osborne/ZDNet

Smart building access systems

In February, an alert was issued that warned of a vulnerability in over 2,300 smart building access systems that was being exploited by attackers to launch DDoS attacks. Linear eMerge E3 systems were being targeted.

Via: ZDNet

12.jpg
3 of 6 Charlie Osborne/ZDNet

Smart cars

McAfee said in February that "model hacking" can be used to compromise the machine learning (ML) and intelligent systems in modern vehicles. A study into the security risks of smart vehicles revealed it was possible to compromise the MobilEye camera system, used in many car models today. 

Via: McAfee

14.jpg
4 of 6 Charlie Osborne/ZDNet

Smart home hubs

ESET, too, documented how other home IoT devices -- in this case, Fibaro, Homematic, and eLAN hubs used to connect and control full IoT setups -- were exploitable for nefarious purposes.  

The severe vulnerabilities included unauthenticated, remote code execution, full device hijacking, and Man-in-the-Middle (MitM) attacks.

Via: ESET

15.jpg
5 of 6 Charlie Osborne/ZDNet

Kaiji botnet

In early May, cybersecurity researchers revealed a new form of malware, Kaiji, that is specifically targeting IoT devices and Linux servers. The malware is compromising devices via brute-force attacks to rope them into a botnet that has the capability to perform six different types of DDoS attacks.

Via: ZDNet

16.jpg
6 of 6 Charlie Osborne/ZDNet

Supercomputers

While not your standard home IoT setup, high-performance supercomputing systems across the UK, Germany, and Switzerland were targeted and infected with cryptocurrency mining malware in May, forcing operators to close down numerous clusters.

Via: ZDNet

Related Galleries

Yubikey Security Key C NFC
Security Key C NFC

Related Galleries

Yubikey Security Key C NFC

8 Photos
First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

10 Photos
iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

5 Photos
OnlyKey hardware security key
OnlyKey

Related Galleries

OnlyKey hardware security key

19 Photos
SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

10 Photos
iVerify: Added security for iPhone and iPad users
iVerify

Related Galleries

iVerify: Added security for iPhone and iPad users

9 Photos
iStorage datAshur BT hardware encrypted flash drive
iStorage datAshur BT

Related Galleries

iStorage datAshur BT hardware encrypted flash drive

18 Photos