As we know today, connected objects are increasingly being hacked.
Their expansion makes them a new target of choice for hackers.
And as we know in the case of computer hacking, the real question is not whether we will ever be hacked, but when we will know and through what loophole. Only in this way can we lay the foundations for rigorous computer security.
You'll love it too: The Vatican's connected rosary has a big security flaw
It is the often vulnerable status of connected objects that foster the creativity of Hackers who can today imagine several ways to penetrate the system of these objects. Methods that can often be considered surprising. Yes anything is possible today whether it's gas pumps from light bulbs or even printers.
Hackers today have skills that allow them to attack you either through your fridge, your computer mouse, the baby phone or even your aquarium thermometer. All tools you hardly ever distrust, but are as vulnerable as a virus-free computer.
On September 10, trend Micro published a report on the classification of pirated connected objects in the dark web market. at the head of the world's most famous connected objects as easily "hackable", we have connected gas pumps. Especially on the side of hackers in Russia, who often pass on information and tutorials to get to engage in mass piracy campaigns.
This is not a new phenomenon and since 2015 Trend Micro has been warning companies and users of these technologies against hacking risks, which has of course happened "There are a number of scenarios that could eventually materialize. This includes recognition of the delivery schedule, extortion of blocking the owner's access in exchange for a certain amount of money, and even sabotage of the gas pump by adjusting the tank's limits to overflow," Bharat Mistry, a senior security strategist at Trend Micro, told online ZDNet.com.
Also during August, it's Microsoft's turn to alert authorities and companies to the risk of infiltration by Russian hackers through "popular connected objects" such as "a VoIP phone," a desk[des téléphones connectés à internet qui sont devenus très répandus, NdlR]top printer and a video set-top box. The most surprising thing about this story, however, was about light bulbs. indeed it would have been possible where it would be possible for hackers to be able to infiltrate the Internet network of a company via it's connected bulb. And this is proven in practice because researchers during a test managed to take control of some connected bulbs of the Philips Hue brand.
And thanks to this feat they noticed that once these bulbs were hacked, it was possible to control other devices connected on the same network. And on this subject an American daily wrote: "At first glance, nothing extraordinary, but imagine thousands or even hundreds of thousands of connected objects close to each other. A malicious program created by hackers can then spread among these objects by compromising one of them, such as a pathogen. ». It is easy to imagine the effects in general on a connected object over the entire system.
On the issue of vulnerability of connected objects and cybersecurity as a whole, Hervé Ysnel, vice president of cybersecurity activities for CGI Business Consulting, points out: "IoT equipment is often used to carry out indirect attacks. If you have a connected refrigerator, it may well continue to work while being controlled by a hacker to bring down other servers elsewhere. And you are not aware of it, A successful attack is the one you don't perceive. »
Now access an unlimited number of passwords: