The dark tech log.

The dark side of the Internet of things

The dark side of the Internet of things

During a recent conversation with my two friends, both of whom are mechatronics students, the topic of cybersecurity and the Internet of Things (IoT) came up. Given my longstanding interest in IoT, we delved into a discussion about the security risks associated with it. This discussion led us to question the importance of raising awareness about IoT security risks. Today, on Dark Tech Log, we will delve deeper into this topic.

What is the internet of things?

The Internet of Things (IoT) is a network of physical devices, vehicles, home appliances, and other objects that are embedded with sensors, software, and network connectivity to collect and exchange data. IoT has the potential to revolutionize many industries, but it also introduces new security risks.

The Internet of Things (IoT) is undoubtedly shaping the future of technology. However, its rapid growth lacks sufficient regulation, leading to a concerning proliferation of vulnerable IoT devices. Nowadays, anyone can create an IoT system, further exacerbating the issue. As the IoT continues to permeate various aspects of our lives, including health facilities, homes, jails, schools, and more, the absence of robust security measures poses a significant risk, potentially resulting in severe consequences.

According to Gartner, there are more than 20 billion IoT devices. and as many as 75 billion connected IoT devices by 2025. Unfortunately, the safety and integrity of these devices are still widely ignored, and there are more and more cases of them being hacked and used as part of a botnet.

There are many security threats associated with IoT devices, including:

  • Data breaches: IoT devices often collect sensitive data, such as personal information, financial data, and health data. If an IoT device is hacked, this data could be stolen.

  • Malware: IoT devices can be infected with malware, which can steal data, disrupt operations, or even take control of the device.

  • Denial-of-service (DoS) attacks: IoT devices can be used to launch DoS attacks, which can overwhelm a network and make it unavailable to legitimate users.

  • Botnets: IoT devices can be infected with malware and turned into part of a botnet, which can be used to carry out malicious activities, such as sending spam or launching DDoS attacks.

Statista reports a significant increase in Internet of Things (IoT) attacks worldwide, with the number reaching over 10.54 million in December 2022. This marks a notable rise compared to the previous year, where reported attacks in December 2021 dropped to nearly six million. The highest number of monthly attacks was recorded in June 2022, reaching approximately 13 million. These figures highlight the growing prevalence and severity of IoT attacks, underscoring the need for robust security measures to protect IoT devices and networks.

Here are a few examples of IoT security bleaches.

1. Smart Security Cameras

Customers were recently alarmed by cybersecurity issues surrounding smart security cameras, specifically the Xiaomi Mijia cameras. A user reported receiving images from other people's homes when streaming content from his camera to a Google Nest Hub. This incident follows a similar pattern seen with Ring, an Amazon-owned home security products provider, which faced a class-action lawsuit due to hacking incidents on its cameras. Additionally, vulnerabilities were discovered in Amazon's Ring Video Doorbell Pro and Blink XT2 security camera systems, potentially granting unauthorized access to users' networks and allowing hackers to view footage, listen to audio, and launch DDoS attacks. In response, Amazon released security patches and advised users to update their devices accordingly.

2.Parents nightmare: hacked baby monitor

The advancement of baby monitors from simple radio transmitters to Wi-Fi-enabled smart devices with cameras and other features has introduced new concerns for parents. Unfortunately, like many IoT devices, these monitors are also susceptible to hacking. A distressing incident occurred last year when a family in the US fell victim to a hacker who gained access to their wireless camera system, which they relied on to monitor their baby. The hacker went as far as threatening to kidnap the child, turning their nightmare into a horrifying reality. Regrettably, this case is not isolated, as there have been multiple reported instances of strangers' voices being heard through baby monitors, further highlighting the vulnerabilities associated with these devices.

4.A spy in your own home

In 2019, CNN managed to access a variety of camera feeds using a search engine for IoT devices Shodan. One of the feeds showed a family in Australia and its daily routine, while other cameras captured a man in Moscow preparing his bed and a woman in Japan feeding her cat. All of them seemed unaware of the fact they could be watched through a camera in their own room. According to CNN, none of the cameras had had security checks and were open to anyone who knew the right address.

5.Hackable medical devices

In 2017, the US Food and Drug Administration (FDA) confirmed that St. Jude Medical’s implantable cardiac devices could be easily hacked. Such devices are usually used to monitor patients’ heart functions and control heart attacks. However, due to transmitter vulnerabilities, hackers could control shocks, administer incorrect pacing, and deplete the battery. And it’s not the only time when the FDA issued similar warnings. Earlier this year a new alert was issued on the security of Medtronic insulin pumps, which hackers could remotely access and control.

5.Jeep Exploitation

Charlie Miller and Chris Valasek, two security researchers, performed something incredible.

They hacked a Jeep while it was driving along a major highway at 70 mph, tampering with its entertainment system, engine, and brakes.

And they didn't do it in the rear seat; they did it from the comfort of a sofa in Miller's basement 10 miles away. Watch a youtube video

Although IoT devices are not as widespread in Kenya compared to many Western countries, it's essential for students, particularly those studying engineering and computer science, to familiarize themselves with these devices. Many students have encountered IoT devices and even developed their own. As a student, it is crucial to prioritize the safety and security of your IoT product for the end consumer. Regardless of the prevalence of IoT devices in the country, emphasizing security should always be a top priority in order to protect users and ensure a trustworthy and reliable product.

How to Safeguard IoT Devices and Networks Against Cyber Attacks

1. Strong Passwords

Before connecting to the network, devices connected to the Internet of Things should be secured. To do so, use strong passwords, keep these devices' security software up to date, and encrypt and authenticate the device.

2. Change Default Passwords

Many IoT devices come with default passwords, which cybercriminals are likely to know. It implies that you should change your default passwords to prevent unauthorized access to your Internet of Things devices.

3. Create Guest Networks

It is critical to secure network connections and Wi-Fi with strong passwords. It is also necessary to create guest networks to prevent hackers from gaining access to the connection and ensure the security of your IoT devices.

4. Examine the Default Settings

Many IoT devices include default privacy and security settings. To avoid uncertainty and cyberattacks, you should consider checking and changing them. Some default settings may be advantageous to the device manufacturer.

5. Maintain Device Updates

Just like mobile updates, Internet of Things device manufacturers may send you updates to update and install new security software. You can also check their websites for updates and IoT protection.

Final words 

Internet-connected devices make our lives easier. However, most of them lack the security features that are standard in computers, tablets, and even smartphones. That’s why, according to the digital privacy expert Daniel Markuson, before acquiring a new IoT device and bringing it home, you should always consider whether it really benefits you.

Thank you, thank you, thank you, as always, for subscribing and reading. Your support means a lot to us, and we truly appreciate it.

Also, I want to remind you that I welcome compliments and criticism at: [email protected]. Feel free to share your thoughts with me.

Let's have a ladies and gentlemen agreement. You like this article you have to follow us on twitter @TheTechKona .

we promise its not boring

Reply

or to participate.