ACM JU Magazine 16th Issue is out Now!
IOT Security
Weaponizing Printers and Compromising the Grid: The Critical Importance of IoT Security
image1
Zaid AbuGhoush
CS Student at JU

In the past few decades, the internet has transcended our screens and seamlessly integrated into our everyday objects. From wearable devices to household appliances, vehicles, infrastructure, and industrial equipment, the pervasive influence of the Internet of Things (IoT) has significantly impacted our world. A report by "IoT Analytics" estimated that by 2023, there were 16.7 billion active IoT devices, promising enhanced convenience and efficiency. However, this surge in IoT adoption has brought forth substantial security concerns that demand our attention.
Security Challenges Beyond the Obvious
While some security concerns, such as data privacy issues, are readily apparent, others are more intricate. In 2017, a hacker known as stackoverflowin compromised 150 thousand printers, coercing them into producing unauthorized warning print jobs. This incident aimed to shed light on the vulnerability of printers and underscored their potential as launch pads for botnet attacks. Botnet attacks involve taking control of a large group of devices and deploying them for subsequent malicious activities.
The Menace of Mirai
However, not all hackers operate with good intentions. In 2016, three consecutive Distributed Denial of Service (DDoS) attacks targeted the domain name system provider Dyn, affecting services ranging from Netflix and PayPal to Xbox Live. This notorious attack leveraged Mirai, a malware capable of compromising remotely controlled devices for botnet attacks. The size of this botnet reached around 145 thousand devices, primarily consisting of IP cameras and home routers. Astonishingly, the hackers responsible for Mirai even shared the malware's source code on GitHub, leading to the continued emergence of its variants.
Beyond Child's Play
Contrary to stereotypes, hackers are not always teenagers engaging in casual mischief. Nation-state actors have increasingly participated in cyberwarfare and espionage, with infrastructure becoming a prime target for Russian and Chinese state-sponsored hackers. In 2022, the Russia-backed Sandworm hackers disrupted the Ukrainian grid by exploiting the grid's operational technology (OT), a subset of IoT focused on business applications.
Understanding IoT Vulnerabilities
Setting aside high-profile targets, most IoT devices are personal, household, or basic business devices. Exploiting the lack of regular security updates, or sometimes the absence of updates altogether, hackers can capitalize on vulnerabilities throughout a device's operational lifespan. Many manufacturers still use universal default passwords, employ weak or no encryption techniques, inadequately protect personal data, and often fail to publicly disclose vulnerabilities. These issues not only compromise individual users but also pose a threat to the broader internet community.
Navigating Uncertainty for Progress
As the number of IoT devices continues to surge annually, so does the potential attack surface. In a world where data holds increasing value, this growth is expected to accelerate, leading to more frequent and sophisticated attacks. Yet, amid this uncertainty, opportunities arise. Various industries are investing substantial sums in IoT security, witnessing the emergence of startups dedicated to the cause. Governments are also actively addressing cyber threats, implementing regulations to ensure IoT security and taking action against hacker groups. Together, these efforts aim to create a more secure and resilient internet for all.

Recommended from this issue