sb-au logo
Story image

Teens prove IoT device vulnerabilities by hacking them

01 Feb 2019

Recently a bizarre event took place, known now as the ‘PewDiePie IoT hack’.

Effectively, YouTube Swedish sensation was afraid of relinquishing his position as number one on the YouTube rankings, so he made a plea to his fans to spread the word. Some put up posters and shared on social media, while others took more extreme measures.

Two teenage megafans went on a mission and hacked hundreds of thousands of printers connected to the Internet around the world and forced them to print a page of paper with one key message: “Subscribe to PewDiePie”.

This earned the two teens – now known as ‘Hacker Giraffe’ and ‘User’ – overnight fame simply because of the extreme scope and audacity of their actions.

Recently they appeared in an interview with the BBC that was conducted anonymously because police around the world are pursuing the pair for their illegal actions. While their actions began as support for PewDiePie, they now insist that their intentions were to warn people about IoT vulnerabilities, asserting everyone wants their device to be smarter, but no one thinks about security.

“I felt like I was doing good and after this, vulnerable printers were going to drop off,” says User. 

And User was right, as following the hacks, the number of vulnerable printers around the world fell by nearly 50 percent. However, KYOCERA Document Solutions relationship marketing manager Aaron Anderson says there are now concerns that copycats with more malicious intents could soon be on the prowl.

“The only response to this fundamental and potentially imminent level of risk is an organisation-wide approach to cyber vigilance. These hacks exploited the existing gaps in software security and affected hundreds of thousands of machines worldwide. Emphasising that more remains to be done to prevent potential risks becoming reality,” says Anderson.

“Printers need to be encrypted as a means to safeguard against the loss of personal data. Encryption is one of the key technologies highlighted within GDPR, so it is imperative that data stored on printers be encrypted to limit the impact of a breach.”

Anderson says within an organisation there are several multiple and exit points from which data can flow, and the humble printer is one of these.

“Whether the data is in the form of e-documents or traditional paper formats, it is important to have a clear knowledge of the risks and an understanding of what data is being held in the printer,” says Anderson.

“Something businesses can do right now, to save yourself a lot of time and stress later, is conduct a thorough audit of all existing data practices, policies and equipment within their organisation.”

According to Anderson, the battle to eliminate IoT cyber threats is entering a new era with new risks and improved technological solutions. While there is cause to be optimistic, organisations must act now to bolster their defences.

KYOCERA Document Solutions has conducted an evaluation of all the potential multi-functional printer security weaknesses and compiled a checklist of the 10 key areas for organisations to secure, which are below:

  1. Capture - scanning and copying documents to uncontrolled destinations can breach data protection guidelines
  2. Output tray - documents left on the output tray account for the biggest loss of data
  3. Machine operating system - an unprotected operating system could allow takeover of the machine
  4. Ports and protocols - open and unused ports and protocols represent a risk that can be exploited
  5. Management - without regular device scanning, persistent security holes could be exploited
  6. Network - data can be intercepted across the network link
  7. Cloud connection - connecting to offsite locations may leave you open to data breach
  8. Device storage - content stored in devices could be accessed
  9. The human factor - employees can leave sensitive information on their desk
  10. Operation panel - an unlocked panel can allow users to tamper with settings
Story image
Ping Identity named Leader in Gartner Magic Quadrant
The recognition comes after a busy year for Ping Identity, following an acquisition and new service offering amid the pandemic.More
Story image
Singapore makes an example of remote working in APAC, but security concerns persist
Respondents are most concerned about WiFi networks (39%), cloud storage (38%), email (36%), new technologies like IoT and 5G (34%), and video conferencing platforms (31%).More
Story image
Palo Alto Networks launches enterprise data loss prevention service
"As a single centralised cloud service, Palo Alto Networks Enterprise DLP can be deployed across an entire large enterprise in minutes with no need for additional infrastructure."More
Story image
Trend Micro launches cloud native security solution for modern applications and APIs
“Application security is an invaluable part of the Cloud One platform, integrating technology to provide superior protection for customers deploying applications wherever it makes the most sense for them."More
Story image
Video: 10 Minute IT Jams - Vectra AI exec discusses cybersecurity for Office 365
In Techday's second IT Jam with Vectra AI, we speak again with its head of security engineering Chris Fisher, who discusses the organisational impact of security breaches within Microsoft O365, why these attacks are on the rise, and what steps organisations should take to protect employees from attacks.More
Story image
Data leakage concerns dominate cloud security perceptions - Bitglass report
How secure is the public cloud? That’s what many IT and security professionals are asking as data leakage becomes a pressing concern for organisations and their data protection strategies.More