Many of these devices (like cameras) are exposed to the internet with NATted ports, since users want to access them on their phones.
- Some use UPnP to automatically open ports. This includes (but is not limited to) telnet, ssh, and http…
- Security on these devices (especially the cheaper ones) often does not exist by design. And users are often too lazy to set decent passwords.
- Some are managed via Chinese servers that have no security measures.
- They can also compromise your computer (through viruses and malware), which can lead that malware to search for other devices on your network.
Some examples include:
The Mirai Botnet
In October 2016, the largest DDoS attack ever targeted the service provider Dyn, using an IoT botnet. After getting into the Mirai system, machines continually searched online for vulnerable IoT devices and used default usernames and passwords to access them, infecting devices like digital cameras and DVRs.
Cardiac Devices
In 2017, the FDA confirmed vulnerabilities in St. Jude Medical’s implantable cardiac devices, allowing hackers to take control over battery life or manipulate pacing and shock settings.
This happened due to issues in the data transmitter that relayed device information to doctors. The FDA noted that hackers could manage a device by accessing the transmitter.
Owlet
Hackers managed to intentionally manipulate the output data.
TRENDnet Webcam
Their software flaws allowed anyone with the camera’s IP address to access feeds, and at times, listen as well. TRENDnet sent user login information in clear text, allowing it to be easily intercepted. On their mobile apps, user login details were stored in clear text.
Jeep
Researchers managed to take full control over a Jeep SUV through the vehicle’s CAN bus. By exploiting a firmware update flaw, they hijacked the vehicle via the Sprint cellular network, discovering they could accelerate, brake, and even force the vehicle off course.
Ring Home
Once, due to accidentally disclosing user info to both Facebook and Google through third-party trackers embedded in their Android app, and later due to an IoT security breach where hackers gained access to several families’ doorbell and home security systems.
The way it was done? Hackers used weak, recycled, or default credentials to access live camera feeds and even communicate using the devices’ microphones and speakers.
Nortek Security (smart locks)
There were ten vulnerabilities in Nortek’s Linear eMerge E3 devices that could let hackers hijack user credentials, control devices (lock/unlock doors), deploy malware, and initiate DoS attacks while getting around built-in security.
Even after being alerted to these vulnerabilities, six were graded with a severity of 9.8 or 10 out of 10. Nortek failed to release updates for a long time, having registered tens of thousands of hits daily across 100 countries.
Philips Device
There was a vulnerability in their TASY Electronic Medical Record system, where a successful SQL injection could expose private patient data. Shortly after, three vulnerabilities were found in their MRI software. The worst breach followed with vulnerabilities in their IoT medical interface products.
Lappeenranta
In November 2016, hackers caused two buildings in Lappeenranta, Finland, to lose heating. The attack made the heating system reboot continuously, preventing it from turning on.
Brickerbot
This relied on a DDoS attack and users who neglected to change default usernames and passwords, ultimately disabling the device.