SlideShare ist ein Scribd-Unternehmen logo
1 von 7
REFRIGERATORS
New weapon or victim of cyber war
Presented by:
Nataraj Bhargava
HAVE YOU HEARD OF NEW WEAPONS OF
CYBER WARS
 100,000 Refrigerators and other home appliances hacked to perform cyber
attack
 After Computers, Servers, Routers, Mobiles, Tablets…. Now its turn of your
home appliances to be a weapon or a victim of cyber war.
 Recently Security Researchers from Proofpoint found more than 100,000
Smart TVs, Refrigerator, and other smart household appliances
compromised by hackers to send out 750,000 malicious spam emails.
WHAT IS THIS ?!!
 As the ’Internet of Things’ becoming smart and popular it became an easy
weapon for cyber criminals to launch large scale of cyber attacks.
 Previously, such attacks were only drafted theoretically by researchers, but
this is the first such proven attack involved smart household appliances that
are used as 'thingBots'- Thing Robots.
 “The attack that Proofpoint observed and profiled occurred between
December 23, 2013 and January 6, 2014, and featured waves of malicious
email, typically sent in bursts of 100,000, three times per day, targeting
Enterprises and individuals worldwide."
WHAT IS THIS ?!!
Like your personal computers can be unknowingly compromised
to built a huge botnet network that can be used to launch
cyber attacks, in the similar way your Smart Household
Appliances and other components of the "Internet of Things"
can be transformed into slaves by the cyber criminals.
The worst thing with these smart appliances is that it can be
easily approached by cyber criminals due to its 24 hour
availability on the Internet with an add-on of poorly protected
Internet environment i.e. Poor misconfiguration and the use of
default passwords.
WHAT HAPPENED ?!!
 More than 25 percent of the volume was sent by things that were not
conventional laptops, desktop computers or mobile devices; instead, the
emails were sent by everyday consumer gadgets such as compromised
home-networking routers, connected multi-media centers, televisions and
at least one refrigerator.
 No more than 10 emails were initiated from any single IP address, making
the attack difficult to block based on location -- and in many cases, the
devices had not been subject to a sophisticated compromise; instead,
misconfiguration and the use of default passwords left the devices
completely exposed on public networks, available for takeover and use.
WHAT NOW?!!
Now it seems that we have 100's of cyber weapon in our home
or in another way 100's of vulnerable dynamites living with us.
This time it has been just a spam mail attack, but answer me..
How much damage could a group of well-trained hackers do,
economic and otherwise, if they really wanted to?
REFERENCES
BE AWARE, STAY SAFE!
 http://investors.proofpoint.com/releasedetail.cfm?ReleaseID=819799
 http://www.zdnet.com/internet-of-things-8-9-trillion-market-in-2020-212-
billion-connected-things-7000021516/

Weitere ähnliche Inhalte

Was ist angesagt?

Power point
Power pointPower point
Power point
drich14
 
Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.
lluís nater
 
Home automation promotion kit
Home automation promotion kitHome automation promotion kit
Home automation promotion kit
lynn li
 

Was ist angesagt? (20)

Wi fi quiz
Wi fi quizWi fi quiz
Wi fi quiz
 
Threats to Mobile Computing
Threats to Mobile ComputingThreats to Mobile Computing
Threats to Mobile Computing
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industry
 
Smart Home Devices
Smart Home DevicesSmart Home Devices
Smart Home Devices
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
The Myth of the “Smart” Fridge
The Myth of the “Smart” FridgeThe Myth of the “Smart” Fridge
The Myth of the “Smart” Fridge
 
Power point
Power pointPower point
Power point
 
Working From Home
Working From HomeWorking From Home
Working From Home
 
Home Smart Home
Home Smart HomeHome Smart Home
Home Smart Home
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Home technologies
Home technologiesHome technologies
Home technologies
 
easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure easyLive Smart Alarm System Brochure
easyLive Smart Alarm System Brochure
 
Home Tech
Home TechHome Tech
Home Tech
 
The Product
The ProductThe Product
The Product
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation Perspective
 
Ready for the Internet of Things?
Ready for the Internet of Things?Ready for the Internet of Things?
Ready for the Internet of Things?
 
Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.
 
Smart home
Smart homeSmart home
Smart home
 
Home automation promotion kit
Home automation promotion kitHome automation promotion kit
Home automation promotion kit
 

Andere mochten auch

04 013-u-pi-anti spam
04 013-u-pi-anti spam04 013-u-pi-anti spam
04 013-u-pi-anti spam
NuuoUTM
 
Zombie apokalypsa jako nástroj gamifikace - Tomáš Pekárek
Zombie apokalypsa jako nástroj gamifikace - Tomáš PekárekZombie apokalypsa jako nástroj gamifikace - Tomáš Pekárek
Zombie apokalypsa jako nástroj gamifikace - Tomáš Pekárek
Asociace UX (Prague ACM SIGCHI)
 

Andere mochten auch (7)

Home Is Where The Tech Is
Home Is Where The Tech IsHome Is Where The Tech Is
Home Is Where The Tech Is
 
04 013-u-pi-anti spam
04 013-u-pi-anti spam04 013-u-pi-anti spam
04 013-u-pi-anti spam
 
Mod1 wfbs new starter
Mod1 wfbs new starterMod1 wfbs new starter
Mod1 wfbs new starter
 
Zombie apokalypsa jako nástroj gamifikace - Tomáš Pekárek
Zombie apokalypsa jako nástroj gamifikace - Tomáš PekárekZombie apokalypsa jako nástroj gamifikace - Tomáš Pekárek
Zombie apokalypsa jako nástroj gamifikace - Tomáš Pekárek
 
Intelligent Monitoring of Refrigeration Units
Intelligent Monitoring of Refrigeration Units Intelligent Monitoring of Refrigeration Units
Intelligent Monitoring of Refrigeration Units
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
 

Ähnlich wie Refrigerators - New weapon or victim of cyber war

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 

Ähnlich wie Refrigerators - New weapon or victim of cyber war (20)

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 

Refrigerators - New weapon or victim of cyber war

  • 1. REFRIGERATORS New weapon or victim of cyber war Presented by: Nataraj Bhargava
  • 2. HAVE YOU HEARD OF NEW WEAPONS OF CYBER WARS  100,000 Refrigerators and other home appliances hacked to perform cyber attack  After Computers, Servers, Routers, Mobiles, Tablets…. Now its turn of your home appliances to be a weapon or a victim of cyber war.  Recently Security Researchers from Proofpoint found more than 100,000 Smart TVs, Refrigerator, and other smart household appliances compromised by hackers to send out 750,000 malicious spam emails.
  • 3. WHAT IS THIS ?!!  As the ’Internet of Things’ becoming smart and popular it became an easy weapon for cyber criminals to launch large scale of cyber attacks.  Previously, such attacks were only drafted theoretically by researchers, but this is the first such proven attack involved smart household appliances that are used as 'thingBots'- Thing Robots.  “The attack that Proofpoint observed and profiled occurred between December 23, 2013 and January 6, 2014, and featured waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting Enterprises and individuals worldwide."
  • 4. WHAT IS THIS ?!! Like your personal computers can be unknowingly compromised to built a huge botnet network that can be used to launch cyber attacks, in the similar way your Smart Household Appliances and other components of the "Internet of Things" can be transformed into slaves by the cyber criminals. The worst thing with these smart appliances is that it can be easily approached by cyber criminals due to its 24 hour availability on the Internet with an add-on of poorly protected Internet environment i.e. Poor misconfiguration and the use of default passwords.
  • 5. WHAT HAPPENED ?!!  More than 25 percent of the volume was sent by things that were not conventional laptops, desktop computers or mobile devices; instead, the emails were sent by everyday consumer gadgets such as compromised home-networking routers, connected multi-media centers, televisions and at least one refrigerator.  No more than 10 emails were initiated from any single IP address, making the attack difficult to block based on location -- and in many cases, the devices had not been subject to a sophisticated compromise; instead, misconfiguration and the use of default passwords left the devices completely exposed on public networks, available for takeover and use.
  • 6. WHAT NOW?!! Now it seems that we have 100's of cyber weapon in our home or in another way 100's of vulnerable dynamites living with us. This time it has been just a spam mail attack, but answer me.. How much damage could a group of well-trained hackers do, economic and otherwise, if they really wanted to?
  • 7. REFERENCES BE AWARE, STAY SAFE!  http://investors.proofpoint.com/releasedetail.cfm?ReleaseID=819799  http://www.zdnet.com/internet-of-things-8-9-trillion-market-in-2020-212- billion-connected-things-7000021516/