If you plan to fill your home with smart home appliances, which one would you like to rethink as a new report? Found that smart devices can be exposed to thousands of scan or hack attempts in a week.
Independent consumer groups, working with NCC Group and Global Cyber Alliance (GCA), created fake smart homes in May this year to conduct new research, ranging from televisions to thermostats to homes. smart. Filled with smart devices. Security system and even a smart kettle.
What is the first week of the test? There have been 1,017 unique scan or hack attempts from around the world, at least 66 of which were for malicious purposes. However, in the next month and busiest week of testing, there were 12,807 unique scan / attack attempts against fake smart home smart devices.
This week, which one? Use weak default usernames and passwords like admin and admin? There were also 2,435 specific attempts to make a malicious connection to your smart device. To get a glimpse of that number, there have been 14 attempts by hackers to launch brute force attacks on these devices every hour.
which? Of all the smart home devices, Epson printers were the most attractive to hackers in the months of testing. Fortunately, the attack on the device failed because it had a fairly strong default password.
The ieGeek security camera that I bought from Amazon didn’t have much luck, but soon after it was installed, researchers who experimented with it were even able to access the device and its video feed and modify some of it. its parameters. Detected that. which? Following the publication of the report, Amazon removed the camera from its online sales.
Which? It is estimated that 97% of all attacks on smart devices are attempts to add smart devices to the Mirai botnet. This vast botnet probes insecure devices and uses brute force attacks to see if a device is protected by a weak password. If so, Mirai installs Trojans on them and adds them to the botnet.
Which one to protect your smart home and smart device? Consumers change the default password, enable all device security features including two-factor authentication when available, perform device security updates, pay attention to phishing attacks and appear to be insecure. We recommend that you return your device.