Ransomware raging, smart appliances security gaps need not be filled

(Original title: Ransomware raging smart home appliances security gaps need not be filled)


This is an unusual night, although it is as quiet as it used to be. The wicker outside the glass window oscillates in a regular manner, and the medical staff sit in the monitoring room after checking the last one. At this time, all 30 monitoring screens jumped to the same ward, successfully attracting everyone's attention. The patient in the picture is a doctor of scientific research. He had a car accident on the second day after he received the highest scientific research achievement award in the industry. Fortunately, he is no longer in danger. However, the next screen made all the medical staff stunned. The patient twitched in the bed. He seemed to have trouble breathing and looked very painful. When the doctors rushed to the ward as quickly as possible, the doctor had already ended his young life.

This incident was identified by the police as a provocative murder! The killer remotely controlled the feeding equipment through the network intrusion, killing people invisible. You may think that this is a scene that happens in the United States or Conan, but with the development of science and technology, more and more smart devices have indeed been exposed under the control of hackers.

The high-profile bitcoin ransomware virus has hit a "brilliant" record in just two days since its outbreak on May 12, resulting in more than 200,000 people affected in more than 150 countries around the world. As of May 13 At 20 o'clock on the 20th, China has 29,372 organizations organized by hundreds of thousands of machine infections, including 4,341 educational and scientific research institutes, which is the hardest hit of the incident. At the same time, the virus continues to spread, universities, railway stations. Various areas such as self-service terminals, postal services, gas stations, hospitals, government service terminals, etc. have been infringed upon. This time, the scale of the blackmail network attacks is large and the impact is severe. The European Police Office calls it “unprecedented”.

The ransomware virus is mainly based on ONION and WNCRY. The performance after poisoning is: the disk file of the victim machine will be changed to the corresponding suffix. Pictures, documents, videos, archives and other data cannot be opened properly. The user can only decrypt and recover by paying the ransom. For these two types of extortion virus, the extortion amount is 5 bitcoins and 300 dollars respectively, equivalent to RMB 50,000 yuan and 2,000 yuan respectively.

The outbreak of ransomware also gives warning light to high-speed development of intelligent equipment. Once the high-risk loopholes of smart products are used, they may be modified, signal hijacked, or even completely controlled. The higher the level of intelligence, it The greater the risk, the greater the "destructive power". A child smart watch is a typical example. After a smart watch is broken, it is likely to become a portable device. At the same time, the contacts stored in the watch are easily tampered with. In the future, the mobile phone is also likely to become This type of blackmail attack target.

With the introduction of artificial intelligence and big data, smart home appliances are currently being developed by intelligent control toward smart scenes, and the market penetration rate and penetration rate have increased year by year. So, do smart appliances have the same information stealing and security risks? After the communication with Mr. Wang, the head of the Haier U+ standard patent department, the reporter learned that the answer is yes. In fact, the safety problem of household electrical appliances has always existed, but with the introduction of intelligent technologies, after the appliance has access to the network, in addition to the "traditional" electrical security, there is an additional information security problem.

The information security of smart home appliances includes identity authentication, rights management, communication encryption, and identity identification. If the user information is lost, not only will the user's privacy leak out, but it will also cause electrical safety problems caused by information security issues, so smart home appliances The issue of information security cannot be ignored. At the "15 March" evening party, the issue of "hijacking" of smart devices was exposed.

The reporter learned that at the annual hacking conference, there are some examples of cracking smart home products. For these top hackers from all over the world, cracking smart home appliances and smart devices on the market is not that difficult. Smart TVs also have the possibility of being invaded. Hackers can remotely control smart TVs and cameras on TVs via WiFi. Intrusion TVs can install adware. Intrusion scenarios can be used to view indoor conditions and record videos. This leads to the daily life of users. Being "live", but not noticeable. US television producer Vizio had also been suspected of illegally collecting user ratings. Vizio installed software on its smart TVs. It collected 11 million TV viewing data and shared it with third parties without the user’s knowledge.

Liu Buchen, a senior observer of the household appliance industry, shared his views on information security of smart appliances. Liu Buchen believes that although smart appliances are the trend of the times, the precondition for achieving “intelligence” should be based on user information not being infringed upon. The "smart" that is collected and easily broken is not true intelligence.

With the advancement of the China Manufacturing 2025 strategy, in addition to smart home appliances accessing the Internet, the intelligentization of device networking in the industrial sector will also become an inevitable trend. In the future, industrial control equipment, including electricity, tobacco, rail transit, metallurgy, petroleum and petrochemical, steel, coal, advanced manufacturing, and gas, will become more closely connected to the Internet, office networks, control networks, and equipment networks. However, in 2016, there have been successive incidents of hackers attacking power grid facilities and large-scale power outages in many countries and regions. Statistics from relevant agencies show that more than 70% of IoT devices have encountered security problems.

In the highly developed Internet era, the construction of network information security is particularly important. In early 2016, network security was formally designated as the key construction direction of the “Thirteenth Five-Year Plan”, ranking the government’s 100 major construction projects in the next five years. Sixth place, the degree of government attention has reached an unprecedented height. According to statistics, in 2012, the size of China's information security industry was only 15.726 billion yuan. In 2016, this market scale has risen to 34.172 billion yuan, and the annual market growth rate has also shown a rising trend. However, after a deep exchange with Mr. Wang, the reporter also learned that the current construction of information security in China is mostly in the Internet field. While smart home appliances, smart homes, and smart homes also have information security threats, they are currently in this area. Policies and standards are still blank. (Zou Ye)

燑br>

FTTH Cable

Ftth Drop Cable,Cable Ftth,Ftth Fiber Cable,Ftth Fiber Optic Cable

Zhejiang Wanma Tianyi Communication Wire & Cable Co., Ltd. , https://www.zjwmty.com