Top 6 most surprising entry points for cyber attacks
Published on: 02 09 2019 | Modified on: 30 08 2019
Whether at home or at work, hackers are becoming ever more ingenious when it comes to getting into IT networks. They exploit the vulnerabilities of susceptible smart devices to come up with cyber attacks which use very imaginative entry points. Synopsis of the most surprising entry points.
1. An electric water heater
Researchers at Princeton University have simulated a scenario that could easily occur in the privacy of our own homes. In this sort of attack, hackers take control of power-hungry devices in order to disrupt the electricity network. According to this study, only 42,000 electric water heaters would be required to take down 86 % of the Polish electrical grid. It’s a chilling thought.
2. A baby monitor
And, while on the subject of our homes, it was partly by hacking baby monitors that hackers orchestrated a distributed denial of service (DDoS) attack against Dyn in 2016.
By overloading this service provider’s servers, attackers managed to make some sites, including the very popular Twitter, Amazon and Airbnb, inaccessible for nearly 12 hours.
3. A computer mouse
Whether it sits on your desk at work or at home, the mouse seems harmless. That's why Netragard, the IT security audit specialists, came up with the idea of hacking into one for the purpose of embedding spyware. It was sent as a promotional package to an employee and, once plugged in, it connected to a third-party server. Mission accomplished for Netragard, who were engaged by the company in question to investigate possible security vulnerabilities.
4. A USB cable
We are often wary of USB sticks that we connect to our computer but did you know that USB cables can be compromised? So be extra careful the next time you go to use a USB device that you have received as a freebie at some event or that someone has loaned you.
5. An aquarium thermometer
Hackers have used the smart thermometer from a North American casino aquarium to gain access to their data. Once again, this demonstrates that vulnerability can often be found in “gadgets” that aren’t covered by the general security policy.
6. A fax machine
You thought the fax machine was obsolete? You were wrong! Nearly 17 billion faxes are still sent each year, especially in the health sector which processes a large volume of sensitive data. This information has not escaped the attention of the hackers who target these devices’ vulnerabilities as a way of getting into an organisation's networks. You think you’re protected because you’ve gone over completely to printers? Maybe you should check that your printer doesn’t have a fax function!
All the smart devices in your private and professional life represent a potential threat as long as manufacturers fail to incorporate security measures at the design stage. But, in addition to this “Security by design” approach, it is essential to maintain these devices in safe operating condition throughout their life cycle. And, therefore, users must be educated in a basic level of digital health. But that's another story.