What Would a Ransomware Attack on Your Smart Home Look Like?

2023-06-30 20:28:09
关注

Illustration: © IoT For All

The convenience and comfort of a smart home may come at a cost. Most people assume their devices are protected, but the opposite is usually true. Smart home ransomware cybersecurity seems unnecessary, but it’s crucial.

Why Can Ransomware Target Smart Homes?

The Internet of Things (IoT) consists of millions of gadgets and appliances with online capabilities. Usually, they’re not as secure as they should be because updating and patching them can be challenging. Globally, it’s projected that more than 17 billion IoT devices are in use, most of which are incredibly vulnerable to hacking.

While most people typically work to secure their network through preventative measures or threat detection, many attacks come from inside. On average, about 20 percent of breaches originate from internal security threats, although the amount can reach 40 percent or more. Smart-home owners may accidentally open themselves up for risk if they aren’t cautious.

Each device acts as an attack vector — a place for hackers to enter a system or network. Weak passwords or security vulnerabilities can let them install ransomware. If they can access an attack vector, they can likely access everything else on the home’s network.

Most people don’t realize anything unsecured acts as an invitation. Home IoT security is essential for people with smart appliances.

What Does a Smart Home Attack Look Like?

Although homeowners may not realize they’ve been hacked immediately, they’ll definitely notice when the threat actor requests a ransom. A typical ransomware attack looks like a pop-up on a computer that encrypts files and offers access back in exchange for money.

They don’t just put computer folders behind a paywall — they can make a home unlivable for its residents. Often, they attack smart homes because they can target critical features like lights or kitchen appliances. For example, they can remotely lock a thermostat at a high temperature until they get their ransom. Using root or administrator functions, they could also blast the air conditioning and alarm functions simultaneously.

People with smart homes will have a different experience because most of their devices are a part of the Internet of Things. They form an interconnected web of devices that track usage and collect data in real time for remote monitoring and control. Hackers can take advantage of that to take control.

How Does an Attack Impact Your Devices?

Ransomware can target most major smart gadgets and appliances. It’s essential to note that attackers can likely lock or misuse every device in a home after initially gaining access.

The most common smart devices are vulnerable to ransomware:

  • Lights: It may seem handy to switch lights on or off with an app, but hackers can use the ability to keep them stuck on one setting or overload a home.

  • Kitchen appliances: While leaving a fridge door open or a burner on is usually a minor inconvenience, hackers can do much more damage. For instance, they could change the fridge temperature so everything spoils or heat the oven in the middle of the night.

  • Vacuum: Many smart vacuums have cameras or sensors to track a home’s layout, so threat actors could threaten to sell a detailed map to strangers unless they receive a ransom.

  • Television: Smart TV ransomware can prevent people from watching anything until they pay to regain access.

  • Cameras: Attackers can access nanny or security cameras to collect private images and videos of residents. For example, one family in Chicago had to disable their smart camera after a stranger used it to speak to their 7-month-old son.

  • Thermostat: People can remotely control a thermostat to change the temperature to something extreme until they receive payment from residents.

  • Voice-activated speakers: Smart speakers have collections of resident voice data. Someone could use those to imitate them or order things online.

  • Locks: A smart lock may seem extra secure, but someone may find themselves locked out of their home if it gets affected by ransomware.

While malicious actors may use the devices differently, the ultimate purpose is to lock a resident out or make the home unlivable so they can get paid.

What Happens After a Ransomware Attack?

Once an attacker gains access to a single device, they can usually reach everything else on a home’s network. They can prevent a resident from using crucial functions of their home, like air conditioning, lights, or appliances. Even though robot vacuum or smart TV ransomware might not seem as critical, any device can give them complete access to someone’s home. The homeowner would have to pay to use their own property again.

Even after paying the ransom, the resident may still face more fallout. The attacker may be encouraged to return for extra ransom because they were successful the first time. In addition, there’s no guarantee they don’t sell any information, images, or audio they collect. That may leave the homeowner vulnerable to more hacks or scams.

How to Protect Your Smart Home

Smart device owners don’t have to be experts to protect themselves from ransomware. Adequate home IoT security relies on performing basic safety duties.

1. Use Strong Passwords

Smart home cybersecurity starts with passwords. Many people don’t bother varying them much. However, strong and unique ones are much more likely to deter attackers. They usually consist of letters, numbers, characters, and symbols — the combination makes brute-force attacks unlikely.

Adding one to every device can be challenging since many don’t have screens or settings menus. Still, the best approach is to secure as many as possible. Certain apps may also allow a single passcode to control everything, but that method carries additional security risks.

2. Protect Your Home’s Network

Hackers can compromise a home’s router to use it in a botnet for further attacks. On top of that, they can change the login credentials so users can’t respond to the attack. It slows internet speed drastically, which they could use as leverage to get a ransom. People should routinely update their passwords to protect their home’s network. Many don’t bother changing it from its default, but using something new is much more secure.

3. Use Multi-Factor Authentication

A multi-factor authentication is a security tool that verifies credentials multiple times before allowing access. It’s an essential part of home IoT security for devices with the option. For example, attempting to change a thermostat’s temperature would send the owner a confirmation text or email.

4. Segregate Devices

Many homeowners can use their router to add a second network that’s completely separate from the original. All they have to do is get to its settings and create a guest version. They can protect their data by segregating every smart device there.

Protect Your Home With IoT Security

Proper smart home ransomware cybersecurity is as simple as using password protection, multi-factor authentication, and segregating devices onto a separate network. While there are more complex measures a homeowner can take, these essential steps can go a long way in ensuring they keep themselves and their devices safe.

Tweet

Share

Share

Email

  • Remote Management
  • Security
  • Cybersecurity
  • Smart Building
  • Smart Home Automation

  • Remote Management
  • Security
  • Cybersecurity
  • Smart Building
  • Smart Home Automation

参考译文
你的智能家居遭遇勒索软件攻击会是什么样子?
插图:© IoT For All → 智能家居的便利与舒适可能会带来一定的代价。大多数人认为他们的设备是安全的,但事实往往并非如此。智能家居的勒索软件网络安全似乎无关紧要,实则至关重要。为什么勒索软件会针对智能家居?物联网(IoT)由数百万台具备联网功能的设备和家用电器构成。通常,这些设备的安全性并不够高,因为更新和修补它们可能比较困难。全球预计已有超过170亿台物联网设备在使用,其中大多数都极度容易受到黑客攻击。虽然大多数人通常会采取预防措施或威胁检测来保护自己的网络,但许多攻击其实来自内部。平均而言,约有20%的入侵源于内部安全威胁,但比例有时可达到40%甚至更高。如果智能家居的用户不小心,他们可能会无意间为自己带来风险。每一台设备都可能成为攻击载体——黑客进入系统或网络的入口。弱密码或安全漏洞可能让黑客安装勒索软件。如果他们可以访问一个攻击载体,就很可能访问家庭网络中的所有设备。大多数人没有意识到,任何没有保障的东西都相当于发出邀请函。对于拥有智能设备的人来说,家庭物联网的安全至关重要。智能家居遭受攻击会是什么样子?虽然房主可能不会立即意识到自己已被黑客入侵,但当攻击者提出勒索要求时,他们一定会有所察觉。典型的勒索软件攻击表现为电脑上弹出一个窗口,用来加密文件,并以金钱为条件提供访问权限。它们不只是把电脑文件设为付费墙,还能让整个房子变得无法居住。通常,他们之所以攻击智能家居,是因为他们可以针对诸如灯光或厨房用具等关键功能。例如,他们可以远程将恒温器设置到一个高温度,直到收到勒索款为止。利用根权限或管理员权限,他们甚至可以同时启动空调和警报功能。拥有智能家居的人会有不同的体验,因为大多数设备都属于物联网的一部分。它们形成了一个互联的设备网络,实时跟踪使用情况并收集数据,以便远程监控和控制。黑客可以利用这一点来实现控制。攻击对你的设备有何影响?勒索软件可以针对大多数主要的智能设备和家用电器。需要指出的是,一旦攻击者获得初步访问权限,他们很可能会锁定或滥用家庭中的所有设备。最容易受到勒索软件攻击的常见智能设备包括: - 灯光:通过应用程序开关灯光似乎很便捷,但黑客可以利用这一功能让灯光固定在某个设置上,或让家庭用电过载。 - 厨房电器:虽然打开冰箱门或炉灶通常只是小麻烦,但黑客可以造成更大的破坏。例如,他们可以改变冰箱温度导致所有食物变质,或在深夜加热烤箱。 - 扫地机器人:许多智能扫地机器人配备了摄像头或传感器,以追踪房屋布局,因此黑客可能会威胁将其详细的布局图卖给陌生人,除非他们收到赎金。 - 电视:智能电视的勒索软件会阻止用户观看任何内容,直到他们付款以恢复访问权限。 - 摄像头:攻击者可以访问保姆或安保摄像头,收集居民的私人照片和视频。例如,芝加哥的一户家庭不得不在陌生人通过他们的智能摄像头对他们的7个月大的儿子说话后将其关闭。 - 恒温器:人们可以远程控制恒温器,将其温度调至极端值,直到居民支付赎款为止。 - 语音助手:智能音箱拥有住户的语音数据。有人可能会利用这些数据来模仿住户,或在网店下单。 - 智能锁:虽然智能锁可能看起来更加安全,但如果受到勒索软件影响,住户可能会被锁在家中。尽管恶意行为者可能会以不同的方式使用设备,但其最终目的是将住户锁在外面或将房屋变得无法居住,从而获得报酬。勒索软件攻击之后会发生什么?一旦攻击者访问了一个设备,他们通常可以访问家庭网络上的所有其他设备。他们可以阻止住户使用房屋中的重要功能,比如空调、灯光或电器。尽管机器人吸尘器或智能电视的勒索软件可能看起来不那么关键,但任何设备都可能让他们获得住户家中完整的访问权限。住户必须支付赎金才能重新使用自己的房产。即使支付了赎金,住户仍可能面临更多的后果。由于第一次勒索成功,攻击者可能会受到鼓励再次回来索取额外的赎金。此外,攻击者并不保证不会出售他们收集的任何信息、图像或音频。这样可能会让住户更容易遭受更多的网络攻击或诈骗。如何保护你的智能家居?智能家居设备的用户并不需要成为专家来保护自己免受勒索软件的攻击。适当的家庭物联网安全依赖于执行基本的安全措施。 1. 使用强密码 智能家居网络安全始于密码。许多人并不太在意密码的多样性。然而,强且独特的密码更有可能阻止攻击者。它们通常由字母、数字、字符和符号组成——这种组合使得暴力破解攻击变得不太可能。虽然为每台设备添加一个强密码可能具有挑战性,因为许多设备没有屏幕或设置菜单,但最好的方法是尽可能多地进行保护。某些应用程序可能允许使用单一密码控制所有设备,但这种做法会带来额外的安全风险。 2. 保护家庭网络 黑客可以破坏家庭路由器,将其用于僵尸网络进行进一步攻击。此外,他们可以更改登录凭证,使用户无法应对攻击。这会大幅降低网络速度,而他们可以用此作为获得赎金的筹码。人们应定期更改密码以保护家庭网络。许多人甚至不会从默认密码开始更改,但使用一个新密码要安全得多。 3. 使用多因素认证 多因素认证是一种安全工具,它在允许访问前会多次验证用户的身份。对于有此功能的设备而言,这是家庭物联网安全的重要组成部分。例如,尝试更改恒温器的温度时,系统可能会向住户发送一条确认短信或电子邮件。 4. 分割设备 许多家庭用户可以通过路由器创建一个完全独立于原有网络的第二网络。他们只需要进入路由器的设置,创建一个访客网络即可。通过将所有智能设备分割到一个单独的网络中,他们可以保护自己的数据。 用物联网安全保护你的家 适当的智能家居勒索软件网络安全其实简单到使用密码保护、多因素认证,以及将设备分割到独立网络上。虽然房主还可以采取更复杂的措施,但这些基本步骤在确保自身和设备安全方面可以发挥巨大作用。远程管理 安全 网络安全 智能建筑 智能家居自动化 → 远程管理 安全 网络安全 智能建筑 智能家居自动化
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘