{"id":42365,"date":"2021-08-18T10:26:30","date_gmt":"2021-08-18T10:26:30","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=2a63e3ac3b424e4a76ab62602dbf90f9"},"modified":"2021-08-18T10:26:30","modified_gmt":"2021-08-18T10:26:30","slug":"83-million-iot-devices-at-risk-of-hacking","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/83-million-iot-devices-at-risk-of-hacking\/","title":{"rendered":"83 million IoT devices at risk of hacking"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/sabina-weston\">Sabina Weston<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">18 Aug, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>At least 83 million\u00a0<a href=\"https:\/\/www.itpro.co.uk\/cloud-computing\/28037\/what-is-iot\">Internet of Things (IoT)<\/a>\u00a0devices around the world could be at risk of hacking, potentially enabling threat actors to listen in on private conversations and\u00a0watch live video streams from baby monitors and smart cameras.<\/p>\n<p>That&#8217;s according to new findings from Mandiant, a cyber security company and subsidiary of\u00a0<a href=\"https:\/\/www.itpro.co.uk\/business-strategy\/mergers-and-acquisitions\/359755\/fireeye-to-sell-its-core-products-and-branding\">FireEye<\/a>.<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nMandiant\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\">security<\/a>\u00a0researchers Jake Valletta, Erik Barzdukas, and Dillon Franke discovered a vulnerability that affects IoT devices that use the Kalay network platform manufactured by Taiwanese IoT and M2M (machine-to-machine) solutions provider ThroughTek.<\/p>\n<p>Tracked as CVE-2021-28372, the vulnerability affects a core component of the Kalay platform, allowing hackers to \u201clisten to live audio, watch real-time video data, and compromise device credentials for further attacks based on exposed device functionality\u201d, according to the researchers.<\/p>\n<p>Although Mandiant was not able to pinpoint the affected devices, its researchers noted that ThroughTek has at least 83 million active devices as well as an estimated 1.1 billion monthly connections on its Kalay platform, with all of them potentially\u00a0being exposed to hackers.<\/p>\n<p>Mandiant disclosed the vulnerability to the US\u2019\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/360203\/us-senate-confirms-new-cisa-head\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a>, which has published an\u00a0<a href=\"https:\/\/us-cert.cisa.gov\/ics\/advisories\/icsa-21-229-01\">advisory report<\/a>\u00a0on the issue that recommends\u00a0that users disconnect their ThroughTek devices from the internet, isolate them from the business networks, and\u00a0to only connect to devices through\u00a0<a href=\"https:\/\/www.itpro.co.uk\/virtual-private-network-vpn\">virtual private networks (VPN)<\/a>.<\/p>\n<p>A spokesperson for the UK\u2019s\u00a0<a href=\"https:\/\/www.itpro.co.uk\/national-cyber-security-centre-ncsc\">National Cyber Security Centre (NCSC)<\/a>\u00a0told\u00a0<em>IT Pro\u00a0<\/em>that it is \u201caware of this vulnerability\u201d, adding that ThroughTek \u201chas released an update to fix the issue\u201d.<\/p>\n<p>\u201cSimply using the platform does not automatically make you vulnerable to real-world impact, as additional information that is hard to guess is needed to exploit the vulnerability in an individual device successfully. To maximise protection, the NCSC recommends individuals keep their software up to date by installing the latest vendor updates as soon as practicable,\u201d said the NCSC spokesperson.<\/p>\n<p>The discovery of CVE-2021-28372 by Mandiant comes two months after Nozomi Networks researchers discovered\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/vulnerability\/359899\/critical-supply-chain-flaw-exposes-iot-cameras-to-cyber-attack\">a similar flaw affecting ThroughTek\u2019s P2P SDK<\/a>, which is used to provide remote access to audio or video streams over the internet.<\/p>\n<p>The UK government is working on a new law that will force IoT device manufacturers to meet minimum security requirements and banning\u00a0them from setting easy-to-hack passwords such as \u2018admin\u2019 or \u2018password\u2019. In April, it was announced that the legislation would\u00a0<a href=\"https:\/\/www.itpro.co.uk\/network-internet\/internet-of-things-iot\/359275\/uks-iot-security-regulation-will-also-include\">also include smartphones<\/a>. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Sabina Weston<\/p>\n<p>        18 Aug, 2021    <\/p>\n<p>      At least 83 million\u00a0Internet of Things (IoT)\u00a0devices around the world could be at risk of hacking, potentially enabling threat actors to listen in on private conversations and\u00a0watch live video &#8230;<\/p>\n","protected":false},"author":627,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-42365","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/627"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=42365"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42365\/revisions"}],"predecessor-version":[{"id":42366,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42365\/revisions\/42366"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=42365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=42365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=42365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}