Off-the-shelf devices that include baby monitors, home security and web cameras, doorbells, and thermostats were easily co-opted by cyber researchers at BGU. As part of their ongoing research into detecting vulnerabilities of devices and networks expanding in the smart home and Internet of Things (IoT), the researchers disassembled and reverse engineered many common devices and quickly uncovered serious security issues.
“It is truly frightening how easily a criminal, voyeur or pedophile can take over these devices," says Dr. Yossi Oren, a senior lecturer in BGU's Department of Software and Information Systems Engineering and head of the Implementation Security and Side-Channel Attacks Lab at Cyber@BGU. "Using these devices in our lab, we were able to play loud music through a baby monitor, turn off a thermostat and turn on a camera remotely, much to the concern of our researchers who themselves use these products."
“It only took 30 minutes to find passwords for most of the devices and some of them were found merely through a Google search of the brand," says Omer Shwartz, a Ph.D. student and member of Dr. Oren's lab. "Once hackers can access an IoT device, like a camera, they can create an entire network of these camera models controlled remotely."
The BGU researchers uncovered several ways hackers can take advantage of poorly secured devices. They discovered that similar products under different brands share the same common default passwords. Consumers and businesses rarely change device passwords after purchasing so they could be operating infected with malicious code for years.
They were also able to logon to entire Wi-Fi networks simply by retrieving the password stored in a device to gain network access.
Dr. Oren urges manufacturers to stop using easy, hard-coded passwords, to disable remote access capabilities, and to make it harder to get information from shared ports, like an audio jack which was proven vulnerable in other studies by Cyber@BGU researchers. “It seems getting IoT products to market at an attractive price is often more important than securing them properly," he says.
Tips for IoT Product Security
With the goal of making consumers smarter about smart home device protection, BGU researchers offer a number of tips to keep IoT devices, families and businesses more secure:
- Buy IoT devices only from reputable manufacturers and vendors.
- Avoid used IoT devices. They could already have malware installed.
- Research each device online to determine if it has a default password and if so change it before installing.
- Use strong passwords with a minimum of 16 letters. These are hard to crack.
- Multiple devices shouldn't share the same passwords.
- Update software regularly which you will only get from reputable manufacturers.
- Carefully consider the benefits and risks of connecting a device to the internet.
“The increase in IoT technology popularity holds many benefits, but this surge of new, innovative and cheap devices reveals complex security and privacy challenges," says Yael Mathov, a Masters student who also conducted the research. "We hope our findings will hold manufacturers more accountable and help alert both manufacturers and consumers to the dangers inherent in the widespread use of unsecured IoT devices."
The BGU research collaboration also includes Michael Bohadana, a researcher at Deutsche Telekom Innovation Labs@BGU and Prof. Yuval Elovici, director of Cyber@BGU, director of
Deutsche Telekom Innovation Labs@BGU and a member of the BGU Department of Software and Information Systems Engineering.
Access the paper here