• About
  • Advertise
  • Contact
Thursday, April 2, 2026
No Result
View All Result
NEWSLETTER
iotwashington
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotwashington
No Result
View All Result
Home Internet of Things

Anatomy of an IoT hack

in Internet of Things
0
SHARES
13
VIEWS
Share on FacebookShare on Twitter

With Internet of Things penetration set for a trillion devices by 2025, according to recent McKinsey numbers, our thoughts are, or should be, turning to security.

One question that could be posed is: Just how could a future IoT attack play out? What route could it take?

A security company reckons it has an answer.

‘Terror in the kitchen’

One World Labs, a security outfit that specializes in penetration testing, forensics, and security code review, presented a session at San Francisco’s RSA Conference in April, where it attempted to address the question.

The scenario that One World Labs conjured up was that by hacking a kitchen oven running Android, it would be able to get access to the appliance owner’s entire home, including its connected thermostat, Wi-Fi garage door opener, associated automobile, and—perhaps most troubling—his or her place of work, which for the purposes of this scenario is a grid-connected hydro-electric power station.

The grid

Theoretically, the hackers would then be able to attack the power grid.

Chris Roberts, the presenter, termed the talk: “From the Oven to the Power Station,” or alternatively “The Terror in the Kitchen.”

Oven

The starting point could be an Android-controlled oven running older software, Roberts thinks.

Older Android software, such as version 4.0.3, is “susceptible to multiple forms of attack,” Roberts says in his presentation (PDF). Rooting and then installing apps onto the oven by hacking the user while he’s on a public hotspot is the premise of the attack.

The target

Roberts’s hopefully imaginary victim is a 15-year power plant veteran. The engineer has a penchant for coffee and likes to frequent a coffee shop near the power plant. That’s where he logs on and manages his evening roast via a suitably geeky IoT-connected oven.

Roberts says that the stooge in this case could be marked by scouring social networks, professional discussion forums, and so on; the oven discovered because the individual posts geo-located pictures of it online.

Coffee

The hacking team knows that the target likes a particular coffee shop in part through social network geo-mapping.

The mark’s failure to use disparate online passwords rounds out the perfect storm—stolen passwords can be found on the Internet. IRC channels can be used for this.

Theater of operations

Once the team has profiled their prey, the scenario sets about penetrating the house.

The key to this element is the fact that the oven is on the home’s Wi-Fi network. Roberts’s team is able to use a widely available network tool that identifies which devices are on a particular network.

Roberts goes into more detail about all of the tools, such as emulators used in the lecture’s Power Point.

The team identifies a thermostat, some home automation switches, and a PC, which includes the energy company’s passwords and backed-up USB drives, Roberts says.

The attack vector

The power plant engineer’s NAS network drive is full of company backups—FTP in that case is open, allowing the perps to “extract all the content.”

The connected thermostat’s GUI is then used for its eco-smart grid server access—whereupon the baddies hypothetically attack the power provider’s network with its 30 dams and 15,000-or-so miles of electrical lines.

And all that via the oven. Roberts doesn’t say what happens to the roast.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes
Download WordPress Themes Free
Download Premium WordPress Themes Free
Free Download WordPress Themes
udemy course download free
download xiomi firmware
Download Premium WordPress Themes Free
udemy paid course free download
Tags: Anatomy of an IoT hack
Next Post

Tech nightmares that keep Turing Award winners up at night

Recommended

How AI will be used to manage 5G networks

IoT Engineering Tip: Simplifying SSH Host ECDSA Key Checking

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Washington USA

© 2024 iotwashington.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotwashington.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In