Keeping the peace in the Internet of Things – Part 2

Sameer Dixit, senior director, Security Consulting Spirent

Criminal attacks come in two main flavours: theft and blackmail. The criminal can either steal money or data from a system, or can threaten to damage it unless paid a ransom. If the driver is terrorism or sabotage, instead of criminal gain, they can simply inflict that damage without any warning.

In the automotive industry connected cars embrace many facets of the IoT: from simply delivering Internet connectivity and GPS location to the vehicle, through monitoring the vehicle for optimum safe performance and anti-theft measures, to sophisticated accident avoidance or even driverless vehicle functions.

Criminals have a choice of either hacking the system to steal the vehicle or its contents, or else to blackmail the manufacturer. GPS jammers are already being used to hide the location of stolen trucks, and remote locking systems have been hacked to enable car theft. Such attacks are obvious, but represent just the tip of an iceberg, says Sameer Dixit, senior director, Security Consulting Spirent.

A connected car might allow the owner to restrict its speed to 100kph when his son is driving it, but the son could hack it and go racing, or his rival could set the speed threshold embarrassingly low. Then what about busy executives using the car’s Internet connection for a bank transfer – can they be sure that their transactions are every bit as secure as they would be on a home or office Internet?

Healthcare is especially vulnerable to the blackmail threat: one patient’s medical record might not have much value to the criminal, but the threat to upload all the medical records to the public Internet could demand a huge ransom from a private hospital. Or even simply to threaten to announce publicly that the trusted hospital system is far from secure. At least one large US hospital has already suffered such attacks.

Large industrial control systems are a very tempting target for blackmail. Tampering with such processes can not only lose money during the shutdown but also leave the whole system badly damaged – as when the Stuxnet worm destroyed a thousand centrifuges in Iran. And the sheer scale of utility networks makes them ideal for terrorist attacks that could disrupt electricity, water or communications across a vast area.

We have not included Finance in this hit list. Criminals have long been targeting financial systems as the most obvious way to steal money, While mobile banking apps and ATMs can be seen as forming an IoT, these end point apps and devices should be regularly tested for security issues . This is not the same as the more general IoT that will include millions of devices that were not historically designed to be connected, and have no inbuilt security against hacking.

The author of this blog is Sameer Dixit, senior director, Security Consulting Spirent

About the Author:

Sameer Dixit is a leader in cyber security with over 15 years of experience in penetration testing and security research. At Spirent, Sameer is leading the ethical hacking and security research team called Spirent Security Labs.

Prior to Spirent, Sameer has worked for leading security companies such as Trustwave-SpiderLabs and Cenzic Inc. where he led the penetration testing, vulnerability scanning and managed security testing services team.

Sameer has contributed research for OWASP, been quoted in various industry-leading security and business publications such as Security Week, Business Insider, ZDnet, SC Magazine, and more. Additionally, he has spoken at various Cyber Security Threat Summits, Universities, conducted webinars, and actively blogs on emerging Web & Mobile security trends.

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more