Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:56 PM
Connect Directly

Lost In Translation: Hackers Hacking Consumer Devices

New grassroots movement aims to fill the gap between security researchers and the consumer industries that are the subject of their hacking projects

Meanwhile, Terry McCorkle and Billy Rios of Cylance have made some headway with the building management systems industry, where they have unveiled serious flaws, such as the discovery of tens of thousands of these systems sitting on the Internet, exposed.

McCorkle says most people outside the security community don't really understand vulnerabilities in consumer products. "It's natural that people would be questioning, 'what are these guys thinking?'" he says. "But most researchers are just interested in finding the truth and making sure we're secure."

With more embedded IP capability for automation and convenience, consumer devices are also becoming more exposed security-wise. It's a shocker to those industries that their products can be hacked: "They always made the assumption that you can't modify the device unless you're in front of it," he says. "But now they are interconnected ... and connected to corporate networks, and they are getting more exposure. I don't think they fully understand the risk that this represents."

McCorkle and Rios have worked closely with the ICS-CERT on vulnerabilities they've found in building automation systems. Building automation systems are "smart" systems that control HVAC, lighting, physical security, and elevators in office buildings.

Just this week, the InsideIQ Building Automation Alliance, an association of independent building automation contractors, announced that it had teamed up with Cylance to provide its members with building automation security practices and security training as well as certification to the customers of the systems.

These are the systems integrators who install and manage building automation systems for building owners, so they are key to driving better security practices, according to McCorkle, who is consulting director at Cylance. Their knowledge and awareness of security issues then gets to the building system manufacturers, he says. "Manufacturers get a lot of advice from the folks who install in the field—those are their [the manufacturers'] customers.

"We're working with them closely because they're the ones who have the opportunity to make the most changes in the industry," such as recommending VPN access for a building automation system rather than leaving it Internet-facing, he says.

[Using a network of cheap sensors, the home-brewed CreepyDOL system can track people by signals sent from their mobile devices. See Cheap Monitoring Highlights Dangers Of Internet Of Things.]

Legislators also need to be brought up to speed on white-hat hacking. There's a lack of depth in the technical understanding of cybersecurity issues in Congress, for example, Percoco notes, so getting lawmakers better schooled on the risks and issues is also needed via intermediaries, he says.

And the current consumer device research has only scratched the surface of the security weaknesses that will be discovered in an increasingly IP networked and embedded generation of consumer products, Percoco says. "Within the next five years, we will talk about things at DEF CON that we are really afraid of today, such as airplanes, cars, medical devices, and wearable computing."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

2 of 2
Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
User Rank: Apprentice
8/9/2013 | 8:33:20 PM
re: Lost In Translation: Hackers Hacking Consumer Devices
I've worked in crypto and medical devices. In both cases you program against murphy, you are conservative, you check inputs, you look for system not just component weaknesses.

Networking certainly adds a lot to the FMEA tables you generate for a med device. Crypto can help of course.
User Rank: Apprentice
2/17/2014 | 2:20:23 PM
re: Lost In Translation: Hackers Hacking Consumer Devices
Excel Translations services include translation in more than 50 languages, multilingual typesetting, global content management, and dedicated project management.

Medical Translations
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-28
An XSS vulnerability in the auto-complete function of the description field (for new or edited transactions) in Firefly III before 5.4.5 allows the user to execute JavaScript via suggested transaction titles. NOTE: this is exploitable only in a non-default configuration where Content Security Policy...
PUBLISHED: 2020-10-28
Gophish before 0.11.0 allows the creation of CSV sheets that contain malicious content.
PUBLISHED: 2020-10-28
Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form.
PUBLISHED: 2020-10-28
Cross Site Scripting (XSS) vulnerability in Gophish through 0.10.1 via a crafted landing page or email template.
PUBLISHED: 2020-10-28
Gophish before 0.11.0 allows SSRF attacks.