11.9 C
London
Saturday, December 21, 2024

Smart gadgets targeted by hackers. “A gateway to data, to our home network”

Must read

- Advertisement -


Smart refrigerators, stoves and vacuum cleaners are already part of our everyday life. However, such modern devices that connect to the network may prove to be a problem. Hackers are increasingly sneaking into devices and can not only change the oven temperature while preparing a meal, but also gain access to a lot of data that we do not want to share.

Not only smartphones, tablets and TVs can connect to the Internet, but also refrigerators, washing machines and vacuum cleaners. This may involve danger.

Smart devices have been gaining popularity in recent years. Customers choose them mainly for convenience and technological improvements. – Young people, i.e. people who, for example, buy apartments or houses, are often interested in this function because it helps in their everyday life and the use of such equipment – says Agnieszka Sasin, an employee of an electromarket.

Devices connect to one network known as IoT, i.e. Internet of Things. – The Internet of Things is actually a network of devices, a lot of everyday equipment, which is now equipped with additional modules for connection to the Internet and remote control via the Internet from anywhere – informs Piotr Konieczny from the Niebezpiecznik portal.

- Advertisement -

SEE ALSO: What caused global paralysis? “Death loop on Windows systems”

This makes it easier to manage your home better, but it also exposes you to potential threats. – Any device connected to the Internet – be it a smart refrigerator, a smart vacuum cleaner, or a smart cooker – can become a target of cybercriminals and be used as a gateway to, for example, our data, our home network – points out Szymon Palczewski, deputy editor-in-chief Cyberdefence24 portal.

They disclosed the data of thousands of patients. Hackers threaten another leak if they don't receive a ransomMarzanna Zielińska/Fakty TVN

Over 20 million attacks

In 2022, Fortinet's FortiGurard Labs researchers detected over 20 million brute force attacks on IoT devices. – Brute force attacks involve checking all possible configurations of characters, numbers and letters in order to guess the correct password, PIN code or encryption key – explains Szymon Palczewski.

In addition to credential extortion, attempts have also been made to exploit security vulnerabilities to spread malware. – It happens that despite a theoretically well-prepared solution and solid security mechanisms, there are some gaps. Based on recent security tests of Internet of Things devices, I admit that the level of security used is systematically increasing, which does not mean, however, that all devices on the market are safe – emphasizes Jan Adamski, NASK expert, Cybersecurity Department.

SEE ALSO: The hacker broke into the tram loop controller. He guessed the password the first time

There can be many attack methods, but each begins with a hacker connecting to the same network where a specific device is located. – If you already have such an IoT device in the network, you can try to scan and find such a device, so it is worth separating guests, or if someone takes over one of our devices, or we have some malware on the computer, then he can check what is still in the network and try to attack our inverter, refrigerator or other vacuum cleaner – points out Mateusz Chrobok, a cybersecurity specialist from the portal czmnie.pl.

Young hackers discovered a scandal involving train manufacturers. Now the company is suing them

Young hackers discovered a scandal involving train manufacturers. Now the company is suing them Jarosław Kostkowski/Fakty TVN

How to protect yourself?

By taking control of the device, the criminal will be able to more easily obtain our most sensitive data that we send via the network, for example data related to electronic banking. Therefore, it is worth connecting devices to a separate network.

– Very often, routers have the option of a guest network and this is the right network to which such solutions should be connected. Why? Because such a network is isolated from the standard network in which our very important laptops, smartphones and other devices work – advises Piotr Konieczny.

READ ALSO: Traps on the Internet. What methods do fraudsters use and how to defend yourself against them?

When choosing a smart washing machine or refrigerator, we should read the instructions carefully and ensure the security of our data by properly configuring the device after purchase.

– The basic security features that appear there – such as logins, passwords – are very often standard things, i.e. if someone comes to your house, they see that you have some equipment, or they don't even have to see it, they will just be on the same network, it is often able to enter your device. Therefore, one of the first things you need to do, once you have such equipment, is to change the default password, otherwise whoever comes will start controlling your toaster or refrigerator – points out Mateusz Chrobok.

Author:Marcin Barszcz

Main photo source: Shutterstock



Source link

More articles

- Advertisement -

Latest article