5 Worst Examples of IoT Hacking and Vulnerabilities in Recorded History


Along with the current advancement in IoT and growing 5G network technology, vulnerability and phishing cases are also increasing. Internet is available to us nearly everywhere you go, from your smartphone internet to public WiFi and from your working organization’s WiFi to the fiber at your home. Faster internet has given Hackers the thing that they need. Moreover, they use more smart IoT sensors and advanced chips to penetrate anything connected to the internet. Sometimes they create those critical situations where even high-security system fails to revert. This article discusses the five worst examples of IoT hacking and vulnerabilities in recorded history that you should know.

1. The Mirai Botnet (aka Dyn Attack)

It was the time of the end of the year 2016 when the most significant DDoS attack was done. In October 2016, that distributed denial of service attack (DDoS) targeted the internet using a botnet of Internet of Things devices. The service provider Dyn was the victim, and most of the internet became inaccessible for longer. The Mirai software enabled the botnet to connect to the Internet of Things. This includes social media services like Twitter and platforms like Netflix, CNN, and the Guardian.

Once after logging into the system with the default passwords that the users often use, the malware damages all the software applications and network layers inside the organization. It then forms duplicates of itself and spreads like a virus into all connected devices. Even the cameras, DVR (Digital Video Recorders), and all other hardware were also affected. Hence this gives good learning about how smart IoT devices can also be misused to a great extent, and here are some thoughts that should be kept for IoT security.

  • Not to use hardware that cannot be fixed or updated, doesn't matter how important it is, even for OS, password, or firmware.

  • Changing the default password and login-id set by the machine should be changed on a regular basis.

  • The firmware and Software of IoT devices should be updated and regularly checked.

  • Every Internet of Things device should have a strong encryption and password system, especially those connected directly to the network.

2. The TRENDnet webcam is not safe to use

Webcam hacks are the most vulnerable because they are directly connected to your internet through hackable devices like Laptops or monitors. This type of attack happens when a smart webcam has faulty or malicious software that lets anyone access it. The incident happened when TRENDnet’s webcam was hacked, obtaining the camera's IP address, as it was used as a SecurView camera for home security. The bug that was put inside it could record audio and video. This should be prevented by taking certain security steps, such as protecting login information with a password, using stronger encryption methods, and hiding IP addresses from hackers.

3. The Verkada Hack

Verkada is a famous cloud-based video monitoring and recording service provided through the cloud to users. It is mainly used as security cameras in hospitals, schools, factories, shops, prisons, etc. But due to the lack of security issues of Verkada itself, hackers find a way to access those mounted video surveillance and steal sensitive information of Verkada software clients. Hackers could able to access the mind-boggling more than 150000 cameras located at different places due to all-over access. Later on, to prevent this from happening again, many sectors and sub-sectors are created, giving admin access to certain people only.

4. The Stuxnet Attack

This is also one of the most famous IoT attacks in the past. This happened in Iran, where a uranium purifying plant in Natanz was attacked. Hackers plant malicious worm access to the Siemens Step7 software running on windows. The hackers who developed the worm now have access to control different machines at the industry level with just one command. They also have access to confidential blueprints and sensitive information about the industry.

The lack of security cleanup and not updating to the latest versions this issue create a big loss for the plant. Back in 2010, many uranium centrifuges were broken apart when IAEA inspected the affected site at the Natanz plant. The government does not give the official report, but it is believed that more than 900 uranium enrichment stabilizers and centrifuges are destroyed, which consists of 30% efficiency of total uranium purification.

5. The New Jeep Hack

This case is quite interesting because even smart cars can be hacked and are connected to internet servers. According to the IBM security informative report, the incident happened in 2015 when one Jeep was going out of control and went offroad. It was then known that Jeep SUV was not out of control, but it was controlled by a group of hackers who directly hacked into the CAN bus of that car. These incidents, like the fast and furious movies, are becoming real.

Using a malicious bug in the firmware update of the IoT chip in the car, they managed to take control of all systems from a distance. The driver cannot control the car or even stop, and it goes off-road to crash. This reminds us how much vulnerability any IoT device can have, no matter what.

Conclusion

These incidents remind how the gift of the internet can become poison for yourself. There can be many ways to prevent these vulnerabilities, but the first thing is the responsible use of IoT devices. Proper software techniques and password management are good enough to prevent threats. If you have a business that depends highly on IoT devices at a small scale or industry level, it is necessary to make safety boundaries. Hiring a tech specialist for regular hardware updates and a cybersecurity expert for guidance is cheaper than dealing with organizational downfall incidents.

Updated on: 09-Jan-2023

4K+ Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements