{"id":12896,"date":"2018-03-26T09:00:29","date_gmt":"2018-03-26T03:30:29","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=12896"},"modified":"2019-11-22T15:31:36","modified_gmt":"2019-11-22T10:01:36","slug":"hacking-robots-sas2018","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/hacking-robots-sas2018\/12896\/","title":{"rendered":"A robot&#8217;s ransom"},"content":{"rendered":"<p>Like most electronic stuff, robots are not immune to cybercriminals. Last year, researchers at IOActive detected as many as 50 vulnerabilities in robots developed by the Japanese firm SoftBank. They informed the manufacturer but never heard back. So this year at the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/tag\/thesas2018\/\" rel=\"noopener noreferrer nofollow\">Security Analyst Summit 2018<\/a>, they decided to demonstrate what can happen if a robot gets hacked.<\/p>\n<p><strong><\/strong><\/p>\n<h2>Hackable robots<\/h2>\n<p><\/p>\n<p>Robots are all around us, toiling away in factories and <a target=\"_blank\" href=\"http:\/\/uk.businessinsider.com\/amazons-robot-army-has-grown-by-50-2017-1\" rel=\"noopener noreferrer nofollow\">warehouses<\/a>, busting a gut in <a target=\"_blank\" href=\"https:\/\/techcrunch.com\/2013\/06\/21\/zenrobotics\/\" rel=\"noopener noreferrer nofollow\">landfills<\/a>, and even working in <a target=\"_blank\" href=\"https:\/\/www.cnet.com\/news\/robots-give-a-helping-hand-in-san-franciscos-newest-hospital\/\" rel=\"noopener noreferrer nofollow\">hospitals<\/a>. For its part, SoftBank Robotics supplies electronic helpers to work with people. The <a target=\"_blank\" href=\"https:\/\/youtu.be\/3G4v0hakLpM\" rel=\"noopener noreferrer nofollow\">NAO<\/a> model introduces school kids and students to programming and robotics, and it also teaches children with autism. Another model, <a target=\"_blank\" href=\"https:\/\/youtu.be\/60j4rdWsAIQ\" rel=\"noopener noreferrer nofollow\">Pepper<\/a>, was created to work in the service sector \u2014 its tasks include attracting potential customers and consulting with buyers.<\/p>\n<p>As the IOActive team discovered, to seize control of NAO you only need to be on the same network as the robot. The experts found vulnerabilities allowing commands to be remotely executed on it, effectively giving over full control of its actions.<\/p>\n<p>To demonstrate how these vulnerabilities can be exploited, the team forced NAO to <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=4djvZjme_-M&amp;feature=youtu.be\" rel=\"noopener noreferrer nofollow\">demand<\/a> bitcoins from its human interlocutor; but real criminals would be limited only by their imagination and programming skills. What\u2019s more, it\u2019s not just NAO that can be infected with ransomware; the more business-oriented Pepper is just as vulnerable, and other models probably are as well.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/4djvZjme_-M?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Just imagine if one fine day a robot teacher or store clerk, in full view of John Q. Public, started swearing and insulting people before going on strike or picking a fight. You never know!<\/p>\n<p><strong><\/strong><\/p>\n<h3>But why would anyone hack a robot?<\/h3>\n<p><\/p>\n<p>What do criminals have to gain here? Won\u2019t it just spoil someone\u2019s day \u2014 or their life? That might be enough incentive for some hackers, who often do such things just for fun. But there\u2019s another reason: money.<\/p>\n<p>The profit motive is pretty simple. Buying a robot costs about $10,000; and if it breaks, it has to be repaired or replaced. Both of those require a fair bit of cash to start \u2014 but factor in the downtime cost and reputational loss of having a robot threaten customers and the sum rises considerably. And if an <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/hacking-industrial-robots\/18152\/\" rel=\"noopener noreferrer nofollow\">industrial robot<\/a> is hacked, it can pose an immediate threat to employee safety or production quality.<\/p>\n<p>An attacker compromising a robot in one of those ways might offer a quick solution to the problem (which they caused) \u2014 pay a ransom and everything will be just fine. But, as you might guess, cybercriminals don\u2019t always keep their word. And, of course, the vulnerable robot might be hacked again, requiring another payout. And then another one.<\/p>\n<p><strong><\/strong><\/p>\n<h3>What can you do?<\/h3>\n<p><\/p>\n<p>Robots are here to stay (and multiply), so avoiding contact with them ain\u2019t the way to go. For that, you\u2019d need to invent a time machine and go back a ways. Instead, users \u2014 and especially manufacturers \u2014 need to be sensitive to robots\u2019 weaknesses.<\/p>\n<p>To ensure that devices don\u2019t go from cutting-edge to catastrophic in the blink of an eye, robot creators need to think through security issues in advance, before production starts. Today. Better still, yesterday. And then, after product release, all ears must be kept firmly to the ground so as to respond promptly to reported vulnerabilities and get them fixed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers investigate how vulnerabilities in robots can be exploited to take control of them.<\/p>\n","protected":false},"author":2484,"featured_media":12897,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1342,2196],"tags":[2272,634,1021,337,333,1037,2345,268],"class_list":{"0":"post-12896","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"category-threats","9":"tag-thesas2018","10":"tag-internet-of-things","11":"tag-robots","12":"tag-sas","13":"tag-security-analyst-summit","14":"tag-technologies","15":"tag-the-sas-2018","16":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacking-robots-sas2018\/12896\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hacking-robots-sas2018\/10762\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacking-robots-sas2018\/15029\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hacking-robots-sas2018\/13314\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacking-robots-sas2018\/12692\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacking-robots-sas2018\/15593\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacking-robots-sas2018\/15233\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacking-robots-sas2018\/20003\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hacking-robots-sas2018\/4816\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-robots-sas2018\/21755\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hacking-robots-sas2018\/10133\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacking-robots-sas2018\/16174\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/hacking-robots-sas2018\/9472\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacking-robots-sas2018\/19920\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-robots-sas2018\/19918\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacking-robots-sas2018\/19948\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/12896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=12896"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/12896\/revisions"}],"predecessor-version":[{"id":17391,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/12896\/revisions\/17391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/12897"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=12896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=12896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=12896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}