【灯泡也能被黑?黑客可以通过灯泡攻击你的电脑】

【灯泡也能被黑?黑客可以通过灯泡攻击你的电脑】智能家居的不断普及,物联网逐渐成为生活中的一部分,智能家居也会受到黑客的攻击。黑客可以远程操纵无人机,飞到灯泡附近可以更新灯泡的固件,从而安装漏洞进而攻击家里的无线网络。专家称这种危险被低估了,而且通过这种方式可能对电网产生危害,造成更大损失。

Forget your laptop: Hackers could soon target LIGHT BULBS to take down the internet

  • Hackers highlighted the vulnerabilities of internet-connected devices
  • They used a drone to deliver an over-the-air firmware update to lights
  • The update spread from infected bulb to their neighbours wirelessly
  • Researchers say that such vulnerabilities could be exploited to cause a power surge and knock out the electricity grid

 

The threat from hackers accessing connected smart devices has stepped up recently, with a number of large scale attacks crashing websites and cutting Internet access.

But a team of hackers in Israel has shown that even the most mundane, but essential, of household objects – the humble light bulb – could be vulnerable to attack.

In a brazen demonstration on a modern office block, they used a drone to deliver a virus wirelessly to smart lights, taking control and making them flick on and off.

Scroll down for video

A team of hackers in Israel has shown that even the most mundane, but essential, of household objects – the humble light bulb – could be vulnerable to attack. They managed to target the Philips Hue smart lighting system (pictured) in an office block in Israel

Researchers say the vital flaw in such wireless smart technology could leave everything from locks to lamps vulnerable to attack.

Manufacturers are increasingly incorporating Internet connectivity into objects, helping them to communicate with one another via the Internet of Things (IoT).

Despite the best intentions of futurists and tech experts, having your fridge, kettle and washing machine talk to your router and your smartphone could prove to be more of a security risk than it seems.

A team at the Weizmann Institute of Science in Rehovot tested the vulnerabilities of the encryption used by these types of connected devices, focusing on a Philips Hue smart lamp.

 

Describing their findings in a paper online, the explain the target for the hack was the Philips Hue smart lamp, which enables users to control multiple bulbs through a smartphone or tablet.

The lamps connect to their neighbours via a ZigBee wireless connection.

By flying a drone to the outside of the building, the team was able to deliver malware, in the form of an IoT worm, wirelessly to the lamps.

Once one of the lamps was hacked with an over-the-air firmware update, the virus spread from one infected lamp to its neighbour.

MailOnline has contacted Philips for comment.

Flashing lights may be little more than an annoyance, but the researchers say with the number of IoT devices set to number in the billions in coming years, such hacks could spread like wildfire by jumping from one device to the next.

With a switch to smart lamps in major metropolitan areas roll out smart lighting to increase control, hackers could potentially take control and force a a power surge, potentially knocking out the electric grid in an area.

Last month, hackers carried out a huge attack on a US firm which monitors and routes internet traffic, cutting off internet access to millions of users.

In one of the most substantial attacks in recent months, hackers swamped the servers of a Dynamic Network Services provider called Dyn, preventing people from accessing everything from Netflix to Facebook.

It is thought the attackers recruited 100,000 connected devices to send requests to Dyn’s servers, causing them to buckle under the volume of requests.

While most computer users and smartphone owners will keep their passwords under wraps, other connected household devices, such as webcams or kettles, may be over looked – with owners forgetting to factory default security settings.

By using default security settings, they have been able to spread malicious code to vulnerable devices - gaining control of their functions.

Recently, web security analysts warned of a flood of online attacks from hackers after code for a bot used to carry out a huge hack was published online.

The code, which can turn unsecured devices such as web cameras, routers, phones and other hackable internet-connected devices into ‘bots’, could be used to target websites, knocking them offline

The malware, called ‘Mirai’, is believed to be behind a landmark attack on security website Krebs On Security, which flooded the servers with a huge volume of requests.

It is thought the same code is behind the Dyn attack which temporarily robbed people of their Twitter access.

By spreading this malware to unsecured devices, such large-scale cyber-attacks can muster an army of objects as innocuous as fridges and kettles, to take down the internet.

链接:http://www.dailymail.co.uk/sciencetech/article-3901906/Forget-laptop-Hackers-soon-target-LIGHT-BULBS-internet.html


Comments are closed.



无觅相关文章插件