Door opener IoT: 90 percent of the firmware files contain critical security vulnerabilities
20 backdoors in network camera: a stroke of luck for hackers
Let’s have a brief look into the network camera of an American provider of surveillance systems. Here, the static and dynamic firmware analysis of the IoT Inspector was able to identify a total of 26 different user accounts, even though the corresponding manual only listed three corresponding accounts. This network camera – actually used for security purposes - bore no less than 20 backdoors, including a Trojan horse. The recent headlines about the presumed hack by Russian hacker group APT28 show that vulnerabilities such as these are also exploited by cybercriminals. The criminals, to whom the burglaries in the Bundestag, the Foreign Office as well as manipulation of the last US elections are attributed, attacked corporate networks via a VoIP phone, an office printer and a video player in order to access the root and expand from there., Unmodified default passwords set by the manufacturer and neglected critical security updates played into their hands.Lack of risk awareness
If classic end-devices such as PCs, servers or notebooks are nowadays adequately monitored and, thanks to innovative AI-based endpoint protection, more and more effectively secured, the danger posed by IoT devices is still greatly underestimated and the corresponding security checks are prioritized with fatal consequences. However, printers, webcams, routers, Wi-Fi access points, and climate controls are at least as vulnerable as the classic computer, offering attackers the same ability to infiltrate networks or capture sensitive data. Consider the latest headlines about ransomware attacks on Canon SLR cameras.Safety tests show where action is needed
As long as market leaders such as Cisco or Microsoft fail to deliver firmware free from vulnerabilities, companies and service providers are urged to actively seek out vulnerabilities in devices themselves. In order not to experience any nasty surprises later on, the firmware of new IoT devices ideally must be checked for vulnerabilities such as hard-coded hashes even before they are used. Only this way can protective and defense measures, such as firewall configurations, be adjusted in time.Über Onekey
EIN SCHLÜSSEL ist der führende europäische Spezialist für Product Cybersecurity & Compliance Management und Teil des Anlageportfolios von PricewaterhouseCoopers Deutschland (PwC). Die einzigartige Kombination aus einer automatisierten Product Cybersecurity & Compliance Platform (PCCP) mit Expertenwissen und Beratungsdiensten bietet schnelle und umfassende Analyse-, Support- und Verwaltungsfunktionen zur Verbesserung der Produktsicherheit und -konformität — vom Kauf über das Design, die Entwicklung, die Produktion bis hin zum Ende des Produktlebenszyklus.
KONTAKT:
Sarah Fortmann
Leiter Marketing
sara.fortmann@onekey.com
euromarcom public relations GmbH
+49 611 973 150
team@euromarcom.de
VERWANDTES BLOG POST
Understanding the EU Cyber Resilience Act and achieve product cybersecurity compliance with ONEKEY’s whitepaper
ONEKEY Whitepaper: Enhance EU CRA compliance. Streamline supply chain risk management & automate compliance controls for secure device market. Download now!
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.