{"id":4627,"date":"2015-02-19T15:25:40","date_gmt":"2015-02-19T20:25:40","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=4627"},"modified":"2019-11-22T15:39:48","modified_gmt":"2019-11-22T10:09:48","slug":"internet-of-crappy-things","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/internet-of-crappy-things\/4627\/","title":{"rendered":"Internet of Crappy Things"},"content":{"rendered":"<p>Lately, there has been a lot of talk about the Internet of Things (IoT) among IT professionals. It means that all things should be connected:\u00a0refrigerators, coffee machines, TVs, microwaves, fitness bands, and drones. But this is just the tip of the iceberg.<\/p>\n<p>It just so happens that due to some peculiarities of the online community, solely consumer electronics enjoy media coverage when it comes to the IoT. In reality, the IoT is not just about home electronics.<\/p>\n<p>There is a flood of appliances which could be connected \u2013 and some are connected \u2013\u00a0without a second thought as to whether or not it\u2019s necessary. Most people barely give a second thought that a hack of a smart-connected appliance could be dangerous and a lot more threatening than a simple PC hack.<\/p>\n<p>On Kaspersky Daily, we\u2019ve regularly written about how unexpectedly vulnerable connected devices can be. The stunning ease in which David Jacobi managed to hack his own smart home continues to provoke bursts of laughter and awed applause during his speeches at various infosec conferences.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A fascinating story how <a href=\"https:\/\/twitter.com\/JacobyDavid?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@JacobyDavid<\/a> hacked his smart home <a href=\"https:\/\/t.co\/ckTyeMVLUp\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/ckTyeMVLUp<\/a> <a href=\"http:\/\/t.co\/q4LiqsBnA4\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/q4LiqsBnA4<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/515189019617918976?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 25, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Another great and detailed example was the hack of a car wash carried out by Billy Rios of Laconicly. Car wash. You know, that thing with huge brushes and foam and so on. Today\u2019s car washes have smart control systems which are connected and, consequently, susceptible to a remote hack.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2015\/02\/05090741\/rios1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7670\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2015\/02\/05090741\/rios1.jpg\" alt=\"Billy Rios of Laconicly\" width=\"800\" height=\"579\"><\/a><\/p>\n<p>If successful, a hacker obtains full control over all aspects of the car wash\u2019s operations. There are vast opportunities to do whatever they want, including getting services free of charge, as the owner account has access to various tools, including a payment system. They can hold a car being washed inside the car wash, after obtaining control over the gates. There\u2019s even the possibility of breaking the car wash or damaging a car, as a car wash facility is equipped with a number of moving components and powerful engines.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\"Your car wash can send emails. Yes, your car wash is on Facebook.\" <a href=\"https:\/\/twitter.com\/XSSniper?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@XSSniper<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2015?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2015<\/a><\/p>\n<p>\u2014 Dennis (@DennisF) <a href=\"https:\/\/twitter.com\/DennisF\/status\/567783336619319296?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Anything else to hack? Sure, anything you wish! For instance, at the Security Analyst Summit 2015 Vasilis Hiuorios, a security expert at Kaspersky Lab reported his hack of a police surveillance system. The police hoped that beam antennas were enough to secure communications.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Now at <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2015?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2015<\/a> Vasilios Hioureas present about Insecurity of Police departments surveillance cameras <a href=\"http:\/\/t.co\/EgLQCsYvJ4\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/EgLQCsYvJ4<\/a><\/p>\n<p>\u2014 Fabio Assolini (@assolini) <a href=\"https:\/\/twitter.com\/assolini\/status\/567788116929302528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>If the police are so careless as to allow hacks of their networks and appliances, it goes without saying that gadget makers are even more so. Another Kaspersky\u2019s expert, Roman Unuchek, demonstrated a hack of a fitness band at SAS 2015: after a series of relatively simple tricks one can connect to a fitness band and download information about the owner\u2019s location tracking.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">And the last session before 20\u00d720, Roman Unuchek present about Insecure wearables <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2015?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2015<\/a> <a href=\"http:\/\/t.co\/RghpjuL5l5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/RghpjuL5l5<\/a><\/p>\n<p>\u2014 Fabio Assolini (@assolini) <a href=\"https:\/\/twitter.com\/assolini\/status\/567792004953858048?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In general, the problem is that those who develop home appliances and make them connected face realities of a brand new world they know nothing about. They ultimately find themselves in a situation similar to that of\u00a0an experienced basketball player sitting through a chess match with a real grand master.<\/p>\n<p>Things get even worse when it comes to the users of connected devices. They don\u2019t bother with security at all. For an average user, a connected microwave is still just a microwave. A user would never imagine it is a fully-equipped connected computer which has means of influencing the physical world.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>There is a flood of appliances which are connected without a thought whether it\u2019s necessary or not #theSAS2015<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5nn5&amp;text=There+is+a+flood+of+appliances+which+are+connected+without+a+thought+whether+it%26%238217%3Bs+necessary+or+not+%23theSAS2015\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Sooner or later, the impact could be detrimental. Considering the challenges the connected world poses to both users and vendors, the latter should start thinking of ways to\u00a0make their products properly secure. For users, our advice is limiting the use of way too \u2018smart\u2019 connected tech.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a flood of appliances which could be connected &#8211; and some are connected &#8211; without a second thought as to whether or not it&#8217;s necessary or secure.<\/p>\n","protected":false},"author":421,"featured_media":4628,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[938,824,525,43,939,929],"class_list":{"0":"post-4627","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-connectivity","9":"tag-fitness-trackers","10":"tag-hacks","11":"tag-privacy","12":"tag-smart-appliances","13":"tag-smart-homes"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/internet-of-crappy-things\/4627\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/internet-of-crappy-things\/4589\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/internet-of-crappy-things\/5150\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/internet-of-crappy-things\/6997\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/internet-of-crappy-things\/7667\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/internet-of-crappy-things\/2605\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/internet-of-crappy-things\/6909\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/internet-of-crappy-things\/6997\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/internet-of-crappy-things\/7667\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/internet-of-crappy-things\/7667\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/connectivity\/","name":"connectivity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=4627"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4627\/revisions"}],"predecessor-version":[{"id":17855,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4627\/revisions\/17855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/4628"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=4627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=4627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=4627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}