Hackers Can Steal Data Via IoT-Based Smart Lights, Here’s How

Forums Security News (Security) Hackers Can Steal Data Via IoT-Based Smart Lights, Here’s How

  • This topic is empty.
Viewing 0 reply threads
  • Author
    Posts
    • #40633
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #News(Security) [ via IoTGroup ]


        Hackers install firmware in these bulbs and then hack the network via WiFi or ZigBee
        At a time when hackers around the world are coming up with new ways to get control of electronic devices, a new study has found that they can hack on internet systems by entering the network through internet-of-things (IoT) based smart lightbulbs.
        Researchers of Israel-based Check Point Institute for Information Security (CPIIS) revealed that these smart lightbulbs can be used by hackers to enter the IoT network and then can collect data from internet networks in homes, businesses, or even smart cities.
        For this study, the researchers conducted experiments on the Philips Hue range of smart lightbulbs and found CVE-2020-6007 vulnerabilities that enabled hackers to infiltrate networks using either the WiFi network or ZigBee, a low-power wireless protocol used by IoT devices.
        After infiltrating the network, the researchers were able to take control of the smart lightbulb.
        Moreover, they even tried to install malicious firmware and eventually were successful in doing so, thanks to the poor security algorithms of such devices.
        This firmware was further able to take control of the network ecosystem in which the device was associated with.
        How IoT Devices Can Be Hacked
        After that, they limit the user’s access to the smart lightbulbs, post which a user is left with no option but to reinstall the mobile application used to control these devices.
        During this time period, the hacker installs the firmware in the smart bulb.
        Once a user reconnects his application to the device, the firmware then attacks the smartphone and enters the wider network ecosystem by infiltrating the IP network present in that home or business.


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.02976805238 Build 26 Aug 2019

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.