Internet of things devices are becoming a privileged target of cyber criminals, recently Akamai disclosed the existence of the Spike botnet which used by bad actors to run DDoS attacks through desktops and IoT devices. Another report issued by the same vendor explained that bad actors are exploiting vulnerable UPnP devices worldwide to run reflection and amplification DDoS attacks.
The number of Internet of Things is growing at an exponential pace with the increase in smart devices deployed in several objects that we daily manage.
Today we will discuss another interesting case occurred in Spain, millions of Network-connected electricity meters, also known as Smart meters, are susceptible to cyberattack due to lack of proper security controls according to studies carried out by the security researchers, Javier Vazquez Vidal and Alberto Garcia Illera.
The researchers explained to the Reuters that they will manage the research ethically, avoiding to the public provide any information that could advantage threat actor in the organization of an attack. They will provide details of the research only when all the deployed smart meters will be secured by the Smart Vendor.
There are three major utility companies in Spain, Endesa, E.ON and Iberdrola and the number of installed Smart meters is 8 million which corresponds to nearly 30 percent of households.
“We are not releasing the exact details; we are not going to say how we did this,” said Garcia Illera”This issue has to be fixed.”
The researchers avoided disclosing also the name of smart meter manufacturer in time I’m writing.
The circumstance is very concerning, bad actors, accessing to the smart meters, could a blackout or conduct fraudulent activities, including billing fraud. The researchers explained that poorly protected credentials stored in the devices could let attackers gain access of smart meters, they were able to take full control of any device, modify its unique ID to impersonate other customer or use the smart meter for launching attacks against the power network.
Immediately the Spanish utility company that deployed the smart meters started the necessary actions to mitigate the risks and improve the security of the devices.
The circumstance is very curious considering that the deployment on the national scale of the smart meters was decided by the Spanish Government to improve national energy efficiency, but apparently, no one had raised the issue of assessing the level of security offered by these devices.
The duo decided to present at Black Hat Europe hacking conference in Amsterdam the results of their research, the two experts have reversed engineered the firmware running on the smart meters and discovered a way to control the device over the power line communications network.
The researchers discovered a flaw that affects the code running on the smart meters, the vulnerability could be exploited remotely to shut down power supplies to individual households, access meter readings, transfer meter readings to other customers and also inject “network worms” that could cause serious problems to the overall network.
The experts explained that the Smart meters deployed by the Spanish utility company use AES-128 encryption to protect data, but this encryption algorithm is not hard to crack with a brute-force attack.
The attack scenario is disconcerting as explained by the experts, a bad actors could shut down an entire countries hacking the network of smart meters
“Oh wait? We can do this? We were really scared,” said Vazquez Vidal,”We started thinking about the impact this could have. What happens if someone wants to attack an entire country?” he said.
Welcome to the Internet of Things era!
(Security Affairs – smart energy meters, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.