Top 6 most surprising entry points for cyber attacks

6 surprising entry points for cyber attacks I Stormshield

Whether at home or at work, hackers are becoming ever more ingenious when it comes to getting into IT networks. They exploit the vulnerabilities of susceptible smart devices to come up with cyber attacks which use very imaginative entry points. Synopsis of the most surprising entry points.

1. An electric water heater

Researchers at Princeton University have simulated a scenario that could easily occur in the privacy of our own homes. In this sort of attack, hackers take control of power-hungry devices in order to disrupt the electricity network. According to this study, only 42,000 electric water heaters would be required to take down 86 % of the Polish electrical grid. It’s a chilling thought.

2. A baby monitor

And, while on the subject of our homes, it was partly by hacking baby monitors that hackers orchestrated a distributed denial of service (DDoS) attack against Dyn in 2016.

By overloading this service provider’s servers, attackers managed to make some sites, including the very popular Twitter, Amazon and Airbnb, inaccessible for nearly 12 hours.

3. A computer mouse

Whether it sits on your desk at work or at home, the mouse seems harmless. That's why Netragard, the IT security audit specialists, came up with the idea of hacking into one for the purpose of embedding spyware. It was sent as a promotional package to an employee and, once plugged in, it connected to a third-party server. Mission accomplished for Netragard, who were engaged by the company in question to investigate possible security vulnerabilities.

4. A USB cable

We are often wary of USB sticks that we connect to our computer but did you know that USB cables can be compromised? So be extra careful the next time you go to use a USB device that you have received as a freebie at some event or that someone has loaned you.

5. An aquarium thermometer

Hackers have used the smart thermometer from a North American casino aquarium to gain access to their data. Once again, this demonstrates that vulnerability can often be found in “gadgets” that aren’t covered by the general security policy.

6. A fax machine

You thought the fax machine was obsolete? You were wrong! Nearly 17 billion faxes are still sent each year, especially in the health sector which processes a large volume of sensitive data. This information has not escaped the attention of the hackers who target these devices’ vulnerabilities as a way of getting into an organisation's networks. You think you’re protected because you’ve gone over completely to printers? Maybe you should check that your printer doesn’t have a fax function!

 

All the smart devices in your private and professional life represent a potential threat as long as manufacturers fail to incorporate security measures at the design stage. But, in addition to this “Security by design” approach, it is essential to maintain these devices in safe operating condition throughout their life cycle. And, therefore, users must be educated in a basic level of digital health. But that's another story.

Share on

If you want to protect yourself from potential breaches of your IT system, Stormshield Network Security (SNS) has a full range of suitable and effective products.
If you want to manage unexpected entry point attacks, our Stormshield Endpoint Security solution monitors and blocks suspicious program behaviour on your computers in real time.

About the author

mm
Victor Poitevin
Digital Manager, Stormshield

Victor Poitevin is Stormshield’s Digital Manager. Attached to the Marketing Department, his role is to improve the Group’s online visibility. This involves Stormshield’s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group’s high digital aspirations.