Categories
Cybersecurity Tech Talk

The Sad State of Security in Consumer Electronics

Every February, the city of Las Vegas plays host to many of the biggest names in consumer electronics at the annual CES conference. For many organizations, this is the show where they release their new cutting-edge products or show their vision for the future. From the latest in smart toasters to AI-powered concept electric vehicles, this show covers it all. In 2020, over 4,500 organizations participated in the show, which encompassed over 2.9 million square feet in venues all around the Las Vegas strip.

This is heaven for a geek like me, and I was finally able to attend the show this year. My goal, besides just geeking out at the new technology, was simple. I wanted to chat with vendors about the security of their products, especially those that are being targeted for home use. In the age of internet-connected refrigerators and cheap cloud-connected home security cameras, we are connecting Internet of Things (IoT) devices to the internet at an amazing pace. It is estimated that there are over 46 billion connected devices out there, an average of 10 devices per household. With all of these connected devices being installed in our homes, I had hoped that security would be a significant focus, however, even now, this does not appear to be the case.

Why Security Is a Concern in These Devices

You might ask yourself why security would be a concern with these devices. I mean who really cares if a refrigerator has a security vulnerability, what is the worst that can happen if a fridge gets attacked? Well, unfortunately a lot of things can happen, and few of them good. Here are a couple of scenarios.

Imagine going to the refrigerator to get a cold glass of milk, and on the screen is a message saying if you do not pay some cybercriminals several hundred dollars soon, your fridge would stop working. This is called ransomware and while not a serious threat to your typical household appliances right now, it is just a matter of time. Ransomware has become one of the biggest threats to networks in organizations in modern times, and there is very little keeping them from targeting homes as well. With the cost of refrigerators rising to several thousand dollars, who would not pay a few hundred to keep it from becoming trash? If you are relying on a warranty to fix this, you are likely out of luck, just as if someone broke into your home and wrecked it.

Did Someone Order a Robotic Disinfector?

Another scenario is a cybercriminal using your device and network to attack other organizations. A Distributed Denial of Service (DDoS) attack is where a bad actor sends a lot of internet traffic to a target, crashing their website or even making their network so slow that they are unable to function. Cybercriminals can use these attacks to extort money from victims, or they may just pay for a service to cripple the target. These attacks are often made possible through the use of botnets, or large groups of infected devices with internet access that the bad actors control and the frequency of the attacks is up. There was a 173% increase in these attacks just between Q3 and Q4 of 2021

(https://portswigger.net/daily-swig/report-ddos-attacks-increasing-year-on-year-as-cybercriminals-demand-extortionate-payouts). Yes, your trusty fridge might have a dark side, attacking hapless victims while also keeping your vegetables fresh, and you may never know it.

These devices can also be used as a way to get inside your network and to help cybercriminals steal information from you, or to spread viruses within your home network as well. Not only are refrigerators a possible target, but any internet connected devices can be used for these purposes and more. Imagine cybercriminals being able to access video or audio feeds from security cameras, or any device in your home that has a camera or microphone built in. This has happened and will continue to happen again.

Alarmingly, many small businesses also use these consumer-grade devices within their organizations, never considering the risks they are taking. From a cost standpoint, this makes sense as enterprise-level cameras and devices can cost twice as much or more, and offer features that small businesses really do not need.

What I Discovered at CES

I was hopeful that somewhere in the 2.9 million square feet of electronics showroom, I would find at least some manufacturers who really touted the strong cybersecurity of their product as a key feature. I was sorely disappointed. What I did find was a lot of blank looks and referrals to other people who were also unable to answer any meaningful questions about the security of their products.

Some of the key questions I asked these vendors were related to how long they expected to support security updates on the devices they are selling, how they handle someone reporting a security issue to them and how security patches were installed.

OK, I get it, these are often salespeople or marketing people, not security gurus. I did not expect them all to have answers to my questions right away. However, I was hopeful that someone at the show could answer some basic questions. In most cases, I was mistaken. Not one vendor I spoke to could tell me how long they would commit to providing security patches for the products that were for sale. While this may not be as critical in a cheap webcam (it is still an issue), where it was very critical, such as connected electric vehicles and cars being manufactured by companies both small and large, there was also no commitment.

Some Amazing, and Very Connected Vehicles Were at CES

It is important to understand that automobile manufacturers are increasingly leaning on technologies such as self-driving features, which make use of computer controlled accelerating, braking and steering, among other things. One major automotive group has called themselves a, “sustainable tech mobility company”, not just a car manufacturer. When I asked about future updates for these vehicles, I was told that they would be supported for, “Quite some time”. Imagine that 12 years from now, it is discovered that a bad actor could access your vehicle via the wireless hotspot or smart phone app, and take over your steering, gas pedal and braking, all while you are driving down the road. Now imagine if the auto manufacturer has stopped supporting security updates to that vehicle. While this sounds like a scary thing worthy of the tinfoilest of hats, if we do not ask the questions now and get some commitment from the manufacturers, we could find this as a real issue. As recently as 2015, Chrysler recalled 1.4 million vehicles after a couple of car hackers were able to disable a vehicle while it travelled down the road at 70 miles per hour. Sometimes the tinfoil is not overkill.

Even if vehicles are not being taken over while driving down the road, other issues still arise. I happen to have a car that is high on the list of those stolen. As a matter of fact, my Dodge Challenger is almost three and a half times more likely to be stolen than the national average here in America. This is in part because they have been shown to be very easy to steal by simply programming a new key to the car. You do not even need to have another key present to do this. In less than a minute, through a flaw in the infotainment system, thieves can add their own key and drive off. Dodge has issued a security recall for this issue where they no longer allow additional keys to be added to the car once locked down, however, while friends with 2019 and 2020 cars have received notifications about the update, I have not received notice for my 2016 model. Until I do, I will not drive my car to the airport, a prime spot for thieves of these cars.

This issue is not just limited to the organization that makes my car. The more computers we put in cars, regardless of the manufacturer, the more likely issues like this will arise. This is why we need a commitment for future security fixes.

Moving away from vehicles, I also spoke to several smart home device manufacturers, including those who made smart door locks, and none of them were able to confirm a commitment for future support.

IoT Devices and Smart Sensors are Becoming Very Common

My Conclusions

All of the walking, all of the questions, and all of the research I did at CES illuminated a couple of things. First was that security is not a key part of these manufacturing organizations’ culture. If security were a key part of the organizational culture, I would have received far less blank stares when I asked even the most basic security questions, even from salespeople. This is a trickle-down effect where a strong and good security culture at the top levels of management eventually influences those throughout the organization.

The second thing is that people are not asking about security when making purchases. If they were, the staff at the booths would have been more prepared to answer them. This is a trickle-up effect. If people do not care to ask for improved security, the salespeople and marketing teams are not going to waste time learning about questions they do not have to answer. As unfortunate as this is, I cannot blame them for this.

As consumers, it is time that we start asking questions about the security of our devices, especially when we are connecting them to our home networks. These are the same home networks where we do our banking, tax filing and other potentially sensitive things. Along with asking about security, it is time that we show these manufacturers that it is an important issue, by buying items that do promote security over those that do not. Many of these smart home devices are sold based on the lowest possible price point being the winner, however, as consumers, it would be very beneficial for us to spend an extra dollar or two for devices that are serious about security. Once this becomes a differentiator with buyers, manufacturers will find it much easier to invest time in security research, and may be far more likely to commit to support of the devices for several years down the road.

Do you have thoughts on the future of security in consumer devices? Let’s hear them in the comments.

Roblox Ransomware, EMOTET is Still Alive, 1 Million Facebook Creds Stolen in 4 Months, and More!

The Jerich Show Podcast
The Jerich Show Podcast
Roblox Ransomware, EMOTET is Still Alive, 1 Million Facebook Creds Stolen in 4 Months, and More!



Loading





/

In this episode, Erich and Javvad discuss ransomware demanding payment through ROBLOX, a cybercriminal that stole over 1 million Facebook accounts in 4 months, a data breach exposes 2 million people’s info, and they offer no help. 

Stories from the show:

Bizarre ransomware sells decryptor on Roblox Game Pass store
https://www.bleepingcomputer.com/news/security/bizarre-ransomware-sells-decryptor-on-roblox-game-pass-store/

A cybercriminal stole 1 million Facebook account credentials over 4 months
https://www.techrepublic.com/article/a-cybercriminal-stole-1-million-facebook-account-credentials-over-4-months/

Emotet malware detections surge 27-fold in first quarter
https://siliconangle.com/2022/06/09/emotet-malware-detections-surge-first-quarter/

Data breach at health care organization may affect 2 million
https://abcnews.go.com/Health/wireStory/data-breach-health-care-organization-affect-million-85262287

 

The Jerichshow Episode 88 – Twitter Fined, CFOs Mushroomed, and More!

The Jerich Show Podcast
The Jerich Show Podcast
The Jerichshow Episode 88 - Twitter Fined, CFOs Mushroomed, and More!



Loading





/

In this episode, Erich and Javvad talk about the arrest of a phishing kingpin, in Nigeria surprisingly, the $150m fine Twitter just got, and a study showing that CFO’s aren’t being included in ransomware talks. 

All this and more in this episode.

 

Stories from the show:

FTC fines Twitter $150M for using 2FA info for targeted advertising:
https://www.bleepingcomputer.com/news/technology/ftc-fines-twitter-150m-for-using-2fa-info-for-targeted-advertising/

Multi-Continental Operation Leads to Arrest of Cybercrime Gang Leader:
https://www.infosecurity-magazine.com/news/operation-arrest-cybercrime-gange/

Most CFOs being left out of ransomware conversations:
https://www.computerweekly.com/news/252520714/Most-CFOs-being-left-out-of-ransomware-conversations

New virus forces people to donate to the poor if they want their data recovered:
https://metro.co.uk/2022/05/24/new-ransomware-demands-victims-donate-to-the-poor-to-unlock-their-data-16698304/

NCSC Report Reveals Phishing Lures Increasingly Disguised as Vaccine Appointments:
https://www.infosecurity-magazine.com/news/phishing-lures-disguised-as/

The Jerichshow Episode 87 – Cyberskills for Cheeseburgers

The Jerich Show Podcast
The Jerich Show Podcast
The Jerichshow Episode 87 - Cyberskills for Cheeseburgers



Loading





/

The Jerichshow Episode 86 – Planes, Wales, and NFT’s

The Jerich Show Podcast
The Jerich Show Podcast
The Jerichshow Episode 86 - Planes, Wales, and NFT’s



Loading





/

The Jerich Show Episode 85 – Coke Hacked, Recruitment SNAFU and Much More!

The Jerich Show Podcast
The Jerich Show Podcast
The Jerich Show Episode 85 - Coke Hacked, Recruitment SNAFU and Much More!



Loading





/

In this episode Erich and Javvad talk about the Coke hack that may not have happened, the UK Army recruiting portal debacle, and Gloucester’s choice not to have cyber insurance. All of this and more in this episode of the Jerich Show 

Stories from the show:

Coca-Cola investigates hackers’ claims of breach and data theft
https://www.bleepingcomputer.com/news/security/coca-cola-investigates-hackers-claims-of-breach-and-data-theft/

Gloucester council reveals more about why it was not insured against cyber attacks
https://www.gloucestershirelive.co.uk/news/gloucester-news/gloucester-council-reveals-more-not-6935231

Data Breach Disrupts UK Army Recruitment
https://www.infosecurity-magazine.com/news/data-breach-disrupts-uk-army/

North Korean hackers targeting journalists with novel malware

https://www.bleepingcomputer.com/news/security/north-korean-hackers-targeting-journalists-with-novel-malware/

The Jerich Show Episode 84 – Crypto Wallets Targeted, Arrests Made and more!

The Jerich Show Podcast
The Jerich Show Podcast
The Jerich Show Episode 84 - Crypto Wallets Targeted, Arrests Made and more!



Loading





/

In this episode, Erich and Javvad cover stories about data breach emails being used to target crypto wallets, some arrests and charges filed against cyber criminals, WhatsApp voice message phishing emails, and much more!

 

Stories From the Show:

Fake Trezor data breach emails used to steal cryptocurrency wallets
https://www.bleepingcomputer.com/news/security/fake-trezor-data-breach-emails-used-to-steal-cryptocurrency-wallets/

UK charges two teenagers linked to the Lapsus$ hacking group
https://www.bleepingcomputer.com/news/security/uk-charges-two-teenagers-linked-to-the-lapsus-hacking-group/

GitHub can now auto-block commits containing API keys, auth tokens
https://www.bleepingcomputer.com/news/security/github-can-now-auto-block-commits-containing-api-keys-auth-tokens/

WhatsApp voice message phishing emails push info-stealing malware
https://www.bleepingcomputer.com/news/security/whatsapp-voice-message-phishing-emails-push-info-stealing-malware/

Hacking forum RaidForums shut down and founder arrested in global police operation
https://www.zdnet.com/article/hacking-forum-raidforums-shut-down-and-founder-arrested-in-global-police-operation/

Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Control Systems
https://www.wired.com/story/pipedream-ics-malware/

 

The Jerich Show Episode 83 – On the Road Again

The Jerich Show Podcast
The Jerich Show Podcast
The Jerich Show Episode 83 - On the Road Again



Loading





/

In this episode, Erich joins Javvad from the airport in Nashville, Tennessee to discuss some of the top cybersecurity stories of the week.

The Jerich Show Episode 82 – Lapsus$ is still going, London Voter Info Leaked and More!

The Jerich Show Podcast
The Jerich Show Podcast
The Jerich Show Episode 82 - Lapsus$ is still going, London Voter Info Leaked and More!



Loading





/

In this Episode, Erich and Javvad cover the weekly hot stories related to the Lapsus$ group, ISACA says we need more staff, London voter info leaked and more.

Stories from the show:

ISACA: Two-Thirds of Cybersecurity Teams Are Understaffed
https://www.infosecurity-magazine.com/news/isaca-cybersecurity-understaffed/

Anonymous claims it has hacked the Central Bank of Russia
https://www.computerweekly.com/news/252515064/Anonymous-claims-it-has-hacked-the-Central-Bank-of-Russia

Over 40,000 London Voters Have Data Leaked to Strangers
https://www.infosecurity-magazine.com/news/over-40000-london-voters-data/

Microsoft confirms they were hacked by Lapsus$ extortion group
https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-they-were-hacked-by-lapsus-extortion-group/

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal
https://www.bbc.com/news/technology-60864283?fbclid=IwAR3NCh_dI68zqoFiqgC1oGxCLGHqBtM14pCmwa6p4J7YDxKBOVP6ckqXnnI

The Jerich Show Episode 81 – Russian AV, Meta Pays Fines and Much More!

The Jerich Show Podcast
The Jerich Show Podcast
The Jerich Show Episode 81 - Russian AV, Meta Pays Fines and Much More!



Loading





/

In this episode, Javvad and Erich talk about the German Governement warning about using Russian anitivirus, Meta gets a fine and the CISSP gets a testing revamp. All this and more!

Stories from the show:

German Government Warns Against Using Russia’s Kaspersky Antivirus Software
https://thehackernews.com/2022/03/german-government-warns-against-using.html

 

Facebook Hit With $18.6 Million GDPR Fine Over 12 Data Breaches in 2018
https://thehackernews.com/2022/03/facebook-hit-with-186-million-gdpr-fine.html

 

Cyber security certification overhaul brings new questions and longer exams
https://www.itpro.co.uk/security/cyber-security/366966/cyber-security-certification-overhaul-longer-exam-questions