Internet-connected devices make our lives easier but at what cost?

Many of the ‘things’ we buy have little regard for security and hacking is rising exponentially, explains Steve Boggan

Wednesday 16 September 2020 10:53 EDT
Comments
(Getty)

An eight-year-old girl stands petrified, frantically looking for the intruder in her bedroom. She can hear him playing an eerie version of “Tiptoe Through the Tulips” but she can’t see him. “Who is that?” she says, and he answers: “I’m your best friend. You can do whatever you want right now. You can mess up your room. You could break your TV.”

The girl, close to tears, yells: “Mummy!” but the prospect of a parent arriving does nothing to deter the intruder. “I’m Santa Claus,” he says. “Don’t you want to be my best friend?”

This isn’t a scene from a Hollywood horror movie. This happened for real last Christmas in a suburban house in Mississippi to the youngster, Alyssa LeMay, but it could have happened here. The intruder wasn’t hiding in Alyssa’s room; he had hacked into an internet-connected camera installed by her parents to keep an eye on her and her three siblings, and he was grooming her through its speaker.

“I did the opposite of adding another security measure,” said Alyssa’s mother, Ashley, after unplugging the Ring security camera. “I put the [children] at risk and now there’s nothing I can do to ease their minds.”

In Port Talbot, Wales, just a month later, 38-year-old Paul Davies and his family can hear voices outside their front door, but there is nobody there. Then his phone rings and a man says: “I’m waiting for you outside. I want to batter you. If you don’t come out, I’m going to steal your car.”

When the man asks if he might see Davies’ three children, the situation seems to be spiralling out of control – but, again, the intruder isn’t there. He has hacked into the camera in the family’s smart doorbell and has been watching their comings and goings remotely.

“When they asked to see my kids, you just think there are some twisted people out there,” says Davies. “You can get internal cameras, too. I’m just thankful we didn’t have those.”

Meanwhile, in Portland, Oregon, a family receives a frantic call from one of their friends urging them to unplug their Amazon Echo voice-activated smart speaker, which controls their lights, heating and home security system. “You’re being hacked,” he warns. How does he know? Because the Echo assistant supposedly only activated when the name “Alexa” is uttered – had been secretly recording the family’s conversations and those recordings were randomly emailed to the friend by the device.

The mother of the family, who doesn't want to be named, says: “I felt invaded. A total privacy invasion. I’m never plugging that device in again because I can’t trust it.”

All of these scenarios have one thing in common; the smart devices they feature are part of the “internet of things” (IoT), a term that describes a world in which almost everything is connected and interconnected via the web to perform the most wondrous tasks to make your life easier, safer and more convenient.

IoT smart devices in your home can learn from your movements and preferences to control temperature, lighting and even music for when you come home. Sensors in your smart fridge can work out when you're low on types of food and drink and order a delivery of them for you. Using your smartphone, you can switch on your internet-connected washing machine, and when running low, it orders more soap powder for you. Meanwhile, your smart oven gets dinner going when your car tells it you’re coming home, and your coffee maker has exactly the right brew ready for when you arrive.

Adam Laurie: ‘If someone took control of an insulin pump remotely, they could change the dosage and potentially kill someone’
Adam Laurie: ‘If someone took control of an insulin pump remotely, they could change the dosage and potentially kill someone’ (IBM)

Most of us are already using IoT, but many of us don’t realise it. If, for example, you buy a set of smart bathroom scales and link them to an app on your phone to record your weight, pulse and so on, then you’re using IoT. You usually know because you’ll soon be bombarded with advertisements for health and fitness products.

It is difficult to find consistent assessments of the extent to which IoT is already embedded into societies worldwide. For example, a report published in June by the technology research company Transforma Insights claimed there were 7.6 billion active IoT devices worldwide by the end of 2019. However, according to a rival research group, Gartner, that figure was 20 billion, generating incomes of $2 trillion a year.

20bn

The number of active devices embedded into society at the end of 2019

And it is this kind of money that’s causing problems like the intruder in Alyssa LeMay’s bedroom. Because in the rush to introduce IoT products of their own and grab a slice of that $2 trillion, many – if not most – manufacturers have made security a low priority.

“The problem is that the companies which manufacture the ‘things’ for the IoT often have no experience of the internet and the security required to keep their customers safe,” says Adam Laurie, head hardware hacker at IBM’s X-Force Red, a team dedicated to exposing exactly these sorts of lapses in cyber security.

Last month, Laurie and his team announced that they had found a security flaw in an IoT module sold by the French aerospace company Thales. The module enables a vast array of products to be connected to the internet via 3G and 4G mobile phone networks – but Laurie and his team found it could be easily hacked into. The vulnerability affects millions of devices, including internet-connected medical appliances such as insulin pumps.

“The vulnerability would enable a hacker to take control of whatever device the module was inserted into and that could result in simple mischief or something much more serious,” says Laurie. “If someone took control of an insulin pump remotely, they could change the dosage and potentially kill someone.

“We understand the same module has been used in some cars – and you can imagine what could happen if a hacker took control of your car while you were driving it.”

And guess what? The default usernames and passwords for many of the most popular brands bought on the high street are… admin/admin

The IBM team told Thales about the flaw months before making it publicly known, and Thales has developed a security fix that can be installed on to the chips in devices. But not all companies act so responsibly and not all devices can have their security remotely updated.

“There are very few manufacturers making the core chips that go into these devices, mostly in China, and often they knock them out very cheaply for products that either can’t be updated or with simple default passwords that can’t be changed by the purchaser but that can easily be guessed by a hacker,” says Ed Geraghty, senior technologist at the campaign group Privacy International.

“A lot of the problem is that it is consumer behaviour that is driving some of these practices. We want things that are cheap and push-button. And the problem is that if you want something like that, it becomes the whole inconsistent triad; you can have it cheap, you can have it done well, or you can have it secure and private – but you can’t have it all.”

The biggest threat to an IoT network can be introduced by just one device arriving with a default username and password that can’t be changed, or by having a user who doesn’t bother changing it. That can be disastrous because hackers share information on default passwords on devices and, consistently, among the most common username/password combos are support/support, admin/admin, default/default, root/root.

There is, however, one combination that is even more common than all of these: nothing at all.

Last year, the internet security company Avira set up a “honeypot”, a decoy IoT device designed to attract hackers, and waited to see what username/password combinations the attackers would try.

Dos and don’ts of your devices

DOS

- Inventory all connected devices in your home and workplace and disable unknown/unused devices. Also set all IoT devices to receive automatic updates and patches, if automatic updates aren’t available, apply patches manually on a regular basis. 
- Enable multi-factor authentication when possible on all IoT devices. 
- Research the age and manufacturer of the product you are buying to ensure it is still supported by a reputable company.

“The most commonly used credential is blank,” says Hamidreza Ebtehaj, a threat analyst at Avira. “Which means the attackers just enter an empty username and password – this is even more common than ‘admin’.”

During the honeypot exercise, the blank combination was tried in 25.6 per cent of all attempts to break in. Of course, the hackers tried it because they knew it had a high success rate. That is a chilling demonstration of just how insecure many IoT devices, and therefore networks, are.

But surely, with billions of devices and only a handful of geeky hackers, the odds of your home being singled out must be tiny? Well, no. The threat is growing exponentially. In similar honeypot operations conducted in the first half of 2019, the antivirus software company Kaspersky detected 105 million attacks on IoT devices launched from 276,000 individual IP addresses. That was an increase of 900 per cent on the previous year.

The extent to which insecure IoT devices could leave your home vulnerable was recently explored by the computing security company Trend Micro. It found that having one insecure device in a connected network could let hackers inside all your other smart gadgets.

“Starting from the front door, there can be a smart lock,” wrote researcher Ziv Chang in Trend Micro’s report Inside the Smart Home: IoT Device Threats and Attack Scenarios. “If compromised, the smart lock can give hackers control over who comes in or out of the house. The most obvious action available for hackers, then, would be to let intruders or accomplices into the house, and another would be to lock out the actual residents.

“Inside the living room, several other devices can be set up. One of these can be a smart speaker, which serves as the conduit for voice-initiated home automation commands. If compromised, a voice-activated device such as a smart speaker can allow hackers to issue voice commands of their own.

“In the kitchen, devices like a smart refrigerator and a smart coffee maker can cause major issues if successfully hacked. Hackers can set up a smart refrigerator to register wrong expiration dates or order an immense amount of groceries online. And even a smart coffee maker can cause great inconvenience if commanded by hackers to brew coffee incessantly.

“Smart devices can now also be found even in the bathroom, most commonly in the form of smart toilets. A smart toilet has different features, such as sensing the right amount of water for flushing waste, that can be very helpful for users. But hackers can use some of its features to make the device act up, by making the toilet flush repeatedly or let water flow continuously from the bidet.”

But why would anyone bother doing this to you?

“There can be several motivations,” says Bharat Mistry, principal security strategist at Trend Micro. “The most obvious one is being a nuisance but there could be an ulterior motive behind that – to gain other information like your banking details, or to leverage that connectivity you have for online shopping and use it to order goods to be delivered somewhere else.

“Gangs that group together can compromise an IoT-connected home with the intention of using it for forward attacks. Your home router, for example [the device that links your computers and IoT appliances to the internet], could be compromised by hackers who then use it – along with routers in hundreds of thousands of other homes – to form a botnet, which is like a remote army of computing devices. Using that, at the flick of a switch, the hackers could attack a company with so much internet traffic that its site crashes.

Bharat Mistry: ‘We have seen cases of organisations being told, pay us this money or we will take your site down’
Bharat Mistry: ‘We have seen cases of organisations being told, pay us this money or we will take your site down’ (Trend Micro)

“It’s called a Distributed Denial of Service attack and it can be used for digital extortion. We have seen cases of organisations being told ‘pay us this money or we will take your site down’. If the company doesn’t pay within a certain length of time, they will launch the attack.”

So, that’s the router in your home being used for extortion and you had no idea. And guess what? The default usernames and passwords for many of the most popular brands bought on the high street are… admin/admin.

Of course, these are just the security concerns. There are also serious issues with privacy, not only from all these devices spying on you in your home, but also with what happens to all the information they gather about you and send back to manufacturers or service-providers.

Do you really want someone to know how much fatty food your fridge is ordering for you? Or how much booze? Or when your home is usually empty? 

Dos and Don’ts of your devices

DON’TS

- Don’t use second-hand IoT devices that you purchase without factory resetting them first. This includes checking the ‘user management’ settings to remove any previous users.
- Don’t sell used IoT devices without removing your user information and factory resetting it before you sell the device.
- Never reuse passwords for your IoT devices. 

“There are now even smart mattresses that are linked to an app that can report back on your sleep patterns,” says Privacy International’s Ed Geraghty. “But, of course, from your movements, it could probably tell when you’re having sex, too.”

Last year, journalists at Bloomberg disclosed that Amazon employs thousands of people to transcribe recordings of Amazon Echo users, ostensibly to help improve the Alexa digital assistant’s understanding of speech and its customers’ needs. None of the more than 100 million people who had bought an Echo had been told that the device does this.

The company said that workers had no way of knowing who was actually talking and so the results were anonymised. However, according to Bloomberg, while the Alexa reviewers could not see a user’s full name and address on the recordings they were transcribing, they could see an account number, a device serial number and a first name. And that would be enough to identify you.

“You don’t necessarily think of another human listening to what you’re telling your smart speaker in the intimacy of your home,” said Florian Schaub, a professor at the University of Michigan who has investigated smart speaker privacy issues. “I think we’ve been conditioned to assume that these machines are just doing magic machine learning. But the fact is there is still manual processing involved.”

Amazon said it had a “zero tolerance” policy for the abuse of its system, that only a tiny number of such recordings were transcribed and that “all information is treated with high confidentiality [using] multi-factor authentication to restrict access, service encryption and audits of our control environment to protect it”.

The information collected about you by your IoT devices is valuable to service providers and advertisers. The more they know about you, the more effective they can be at serving up the advertising most likely to encourage you to buy something.

A quick tour of the internet demonstrates the extent to which manufacturers and advertising companies are salivating over all the new information coming their way.

For example, as part of a pitch to attract companies who want to sell their products to you using TV advertising, Samsung boasts to potential advertisers: “Samsung Smart TVs have built-in automated content recognition (ACR) technology that can understand viewing behaviour and usage including programmes, movies, ads, gaming content and [internet] apps in real-time.”

This, Samsung says, will be used to send a company’s ads to its target audience – using subscribers’ other devices, such as phones, tablets etc – even if the target viewers missed seeing the original advert on TV.

And how about this pitch, from Swedish marketing company Bannerflow, telling advertisers about the potential of IoT products that can be connected through a smartphone because they contain a contactless chip similar to the one you have in your bank card.

I acknowledge that everything is hackable and it just depends on the length to which a bad-actor will go to defeat the security measures

“Touchpoints are all around us. With the IoT, where they are,  the sheer number of new opportunities for businesses looks set to explode,” gushes the Bannerflow pitch. “Take, for example, the simple bottle. Thanks to contactless technology, selected bottles of Malibu offer consumers exclusive content. All an inquisitive buyer has to do is tap the ‘smart’ bottle and sign in using a smartphone.

“Owner of the brand, Pernod Ricard, will no doubt be quite happy to receive the consumer’s data too. Oh, and if you’re not a rum person there’s whisky. Diageo, like its competitor, has developed a bottle of Johnnie Walker that can tell when it’s consumed, and – if you opt in – who drank it. The Holy Grail of marketing info.”

Linking IoT technology to advertising like this is called “ad tech” and under General Data Protection Regulation (GDPR), it can only be fed to us if we agree when we adopt an app or product. That consent is given when you sign up to the “terms and conditions” that come with just about everything – the terms and conditions that hardly any of us ever read because they are too long and complex.

“GDPR [which was introduced in 2018] has been quite a sledgehammer of a piece of legislation, and anyone who wants to sell their IoT products in Europe – including the UK – must comply with it,” says Privacy International’s Geraghty. “It covers the way our information should be safeguarded and the way ad tech is bundled up and fed to us.

Diageo has developed a bottle of Johnnie Walker that can tell when it’s consumed, and – if you opt in – who drank it. The Holy Grail of marketing info

“The problem is with enforcement, and there isn’t evidence of much enforcement going on. The maximum fine for anyone breaching GDPR is 4 per cent of a company’s annual turnover worldwide. But you might argue that if 100 per cent of your business model is collecting people’s private information and selling it on to advertisers in breach of GDPR, then that 4 per cent could be described as a cost of doing business.”

So, what does the future hold?

In terms of privacy, most observers agree that where companies comply with GDPR rules on what can and cannot be done with our information, the protections are good. However, as Geraghty says, enforcing every breach will be impossible. And while we all keep accepting terms and conditions without reading them, occasionally we will fall foul of individuals with bad intentions.

In terms of security, the world of IoT products is largely unregulated and open to massive and relentless abuses. John Moor, chief operating officer of the IoT Security Foundation, which campaigns for greater oversight of product standards and security, says it is unlikely that there will ever be internationally agreed standards on just how safe products should be.

“Having spent the last five years running the IoT Security Foundation, I can honestly say that IoT security is a wicked challenge,” he says. “It is impacted by the technical, the organisational, the user, societal, political, economic and philosophical dimensions as a minimum.

“Perfect security is elusive but we should not let perfect be the enemy of the good – ‘secure-enough’ is the goal. I acknowledge that everything is hackable and it just depends on the length to which a bad-actor will go to defeat the security measures – if the bad-actor is, say, a nation state with a long time horizon, deep pockets and the necessary skills, then most defences can be compromised. However, a nation state is unlikely to want to hack you personally.”

Last year, in conjunction with the National Cyber Security Centre, the government drew up proposals for legislation that would ensure that all IoT products had to have unique passwords that could not be changed back to weak defaults; that their manufacturers had to provide platforms where the public could report vulnerabilities; and that manufacturers had to state how long they would provide security updates for each IoT device.

The EU is also beginning to sit up and take notice of the potential for abuse of IoT and the way it could be exploited by the big data companies to corner the market in services linked to their devices. Last month the European Commission set up an antitrust competition inquiry into the sector.

Margrethe Vestager, the European commissioner in charge of IoT competition policy, said: “The consumer ‘internet of things’ is expected to grow significantly in the coming years and become commonplace in the daily lives of European consumers. Imagine a smart fridge making your grocery list, you pulling up that grocery list on to your smart device and order a delivery from a shop that sends the groceries to your door that unlocks automatically with a word. The possibilities seem endless. 

But access to large amounts of user data appears to be the key for success in this sector, so we have to make sure that market players are not using their control over such data to distort competition, or otherwise close off these markets for competitors. This sector inquiry will help us better understand the nature and likely effects of the possible competition problems in this sector.”

If Covid-19 doesn’t get in the way, the legislation resulting from both these processes might go some way to restoring confidence in what is currently viewed by many as the tech equivalent of the wild west.

In the meantime, it is worth considering that all IoT devices come with a trade-off between privacy, security, and convenience. Only you can decide whether that trade-off is worth it.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in