Active Stocks
Fri Sep 29 2023 15:59:14
  1. Tata Steel share price
  2. 129 1.78%
  1. NTPC share price
  2. 245.65 3.3%
  1. Power Grid Corporation Of India share price
  2. 199.85 -0.45%
  1. State Bank Of India share price
  2. 598.7 1.48%
  1. Wipro share price
  2. 406.25 0.11%
Business News/ Technology / News/  Hackers are eyeing your connected devices

Hackers are eyeing your connected devices

The report advises that users should use complex and unique passwords for each service, and use a password manager too for simplicity
  • The increasing complexity with each additional device and automation rule also means an expanding attack surface
  • Premium

    As our homes and gadgets like speakers, TVs and fridges begin talking to each other with rising frequency, ushering the Internet of Things (IoT) era, they are simultaneously becoming increasingly vulnerable to hacker attacks.

    Last month, security firm Trend Micro revealed in a report how an attacker can monitor activity within the home or building through sensors, cameras, and any other device capable of collecting information from its surroundings.

    On Wednesday, just a day after we celebrated World IoT Day, a report by security firm Sophos revealed that when it laid honeypots, Mumbai received over 600,000 brute-force login attacks in the one-month period that Sophos researchers conducted the study.

    Honeypots are designed to purposely engage and deceive hackers and identify malicious activities performed over the internet. Multiple honeypots can be set on a network to form a honeynet.

    When cybercriminals start interacting with the device, they trigger alarms to alert a business or individual to their presence and track their activity. While there are many types of honeypots, Sophos used low-interaction honeypots (a honeypot which, once found by the hacker, will not be of much use to hackers) and high-interaction honeypots (ones that permit the attacker to go further in order to gather additional information about their intentions) for this study.

    The honeypots in this study simulated the Secure Shell (SSH) service and, therefore, measured SSH login attempts. SSH is a remote access service used not only by servers, but is also enabled in domestic environments in devices as diverse as CCTV cameras or NAS (network access storage) devices.

    Sophos initially set up honeypots in 10 of the most popular Amazon Web Service (AWS) data centers in the world and made sure that the honeypots are not affiliated with Sophos or any other company other than, perhaps, the hosting provider. To a hacker, the honeypots appeared "as just a number, a bit of extra processing power that could be theirs, a camera they could control or a directory of files they could access and share", according to the Sophos report.

    About 95% of the traffic Sophos tracked appeared to originate in China. This doesn’t necessarily mean that the attackers conducting these brute-force attempts are also located in China, the report clarified, "because attacks may be routed through other machines under the attackers' control".

    The London honeypot alone suffered 314,000 login attempts over the course of the 30 days in which Sophos ran these honeypots, while the honeypots hosted in Mumbai and Ireland received more than 600,000 login attempts. Does this mean that hosting services in London is safer than hosting services in Mumbai?

    No, clarifies the Sophos report, since the brute-force login attempts varied in complexity from default usernames and passwords down to complex passwords with what security practitioners would consider sufficiently complex combinations of numbers, letters, and special characters. Looking at what drives this number of brute force login attempts, for instance, Sophos found the dominant problem was ongoing exposure as a result of not changing default usernames and passwords (eg. root, admin, user, ubuntu and postgres).

    Further, many devices ship with default passwords. "Whether they are easy to guess or not, this is always a mistake," cautions the Sophos report. The report advises that users should use complex and unique passwords for each service, and use a password manager too for simplicity.

    Trend Micro researchers, too, pointed out last month that IoT has given rise to complex IoT environments (CIE) comprising at least 10 IoT devices that are functionally chained together and integrated into an environment using an IoT automation platform. For instance, a smart home has an internet connection throughout the entire CIE, which requires Ethernet or fiber wiring and modems and Wi-Fi routers.

    Devices integrated into the environment can include a gateway, smart bulbs, smart locks, speakers and TVs. The complexity afforded by automation platforms, note Trend Micro researchers, expands the possibilities in smart homes and buildings and other setups in various settings. However, they caution that the increasing complexity with each additional device and automation rule also means an expanding attack surface.

    For instance, if smart locks are installed and connected to the CIE, attackers could modify automation rules that would allow them entry into the home and make the sensors either recognize them as one of the homeowners or leave the doors unlocked. Attackers could also analyze and clone the owner’s voice and play the resulting sound file to bypass any voice recognition checks by connected devices in the CIE.

    Homeowners, thus, should check automation rule files and make backups, advise the Trend Micro researchers. They should also enable two-factor authentication where applicable.

    "Exciting news! Mint is now on WhatsApp Channels 🚀 Subscribe today by clicking the link and stay updated with the latest financial insights!" Click here!

    Leslie D'Monte
    Leslie D'Monte has been a journalist for almost three decades. He specialises in technology and science writing, having worked with leading media groups--both as a reporter and an editor. He is passionate about digital transformation and deep-tech topics including artificial intelligence (AI), big data analytics, the Internet of Things (IoT), blockchain, crypto, metaverses, quantum computing, genetics, fintech, electric vehicles, solar power and autonomous vehicles. Leslie is a Massachusetts Institute of Technology (MIT) Knight Science Journalism Fellow (2010-11). In his other avatar, he curates tech events and moderates panels.
    Catch all the Technology News and Updates on Live Mint. Download The Mint News App to get Daily Market Updates & Live Business News.
    More Less
    Updated: 10 Apr 2019, 05:20 PM IST
    Next Story
    Recommended For You
    Switch to the Mint app for fast and personalized news - Get App