Hackers lurking in vents and soda machines

Advertisement
By Nicole Perlroth, The New York Times | Updated: 8 April 2014 13:07 IST
They came in through the Chinese takeout menu.

Unable to breach the computer network at a big oil company, hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business's vast computer network.

Security experts summoned to fix the problem were not allowed to disclose the details of the breach, but the lesson from the incident was clear: Companies scrambling to seal up their systems from hackers and government snoops are having to look in the unlikeliest of places for vulnerabilities.

Hackers in the recent Target payment card breach gained access to the retailer's records through its heating and cooling system. In other cases, hackers have used printers, thermostats and videoconferencing equipment.

Advertisement

Companies have always needed to be diligent in keeping ahead of hackers - email and leaky employee devices are an old problem - but the situation has grown increasingly complex and urgent as countless third parties are granted remote access to corporate systems.

This access comes through software controlling all kinds of services a company needs: heating, ventilation and air-conditioning; billing, expense and human-resources management systems; graphics and data analytics functions; health insurance providers; and even vending machines.

Break into one system, and you have a chance to break into them all.

Advertisement

"We constantly run into situations where outside service providers connected remotely have the keys to the castle," said Vincent Berk, chief executive of FlowTraq, a network security firm.

Figures on the percentage of cyberattacks that can be tied to a leaky third party are difficult to come by, in large part because victims' lawyers will find any reason not to disclose a breach. But a survey of more than 3,500 global IT and cybersecurity practitioners conducted by a security research firm, the Ponemon Institute, last year found that roughly a quarter - 23 percent - of breaches were attributable to third-party negligence.

Advertisement

Security experts say that figure is low. Arabella Hallawell, vice president of strategy at Arbor Networks, a network security firm in Burlington, Mass., estimated that third-party suppliers were involved in some 70 percent of breaches her company reviewed.

"It's generally suppliers you would never suspect," Hallawell said.

Advertisement

The breach through the Chinese menu website - known as a watering hole attack, the online equivalent of a predator lurking by a watering hole and pouncing on its thirsty prey - was extreme. But security researchers say that in most cases, attackers hardly need to go to such lengths when the management software of all sorts of devices connects directly to corporate networks.

Heating and cooling providers can now monitor and adjust office temperatures remotely, and vending machine suppliers can see when their clients are out of Diet Cokes and Cheetos. Those vendors often do not have the same security standards as their clients, but for business reasons they are allowed behind the firewall that protects a network.

Security experts say vendors are tempting targets for hackers because they tend to run older systems, like Microsoft's Windows XP software. Also, security experts say these seemingly innocuous devices- videoconference equipment, thermostats, vending machines and printers - often are delivered with the security settings switched off by default. Once hackers have found a way in, the devices offer them a place to hide in plain sight.

"The beauty is no one is looking there," said George Kurtz, the chief executive of Crowdstrike, a security firm. "So it's very easy for the adversary to hide in these places."

Last year, security researchers found a way into Google's headquarters in Sydney, Australia, and Sydney's North Shore Private hospital - and its ventilation, lighting, elevators and even video cameras - through their building management vendor. More recently, the same researchers found they could breach the circuit breakers of one Sochi Olympic arena through its heating and cooling supplier.

Fortunately, the researchers were merely testing for flaws that could have been exploited by real hackers.

Billy Rios, director of threat intelligence at Qualys, a security firm, was one of those researchers. He said it was increasingly common for corporations to set up their networks sloppily, with their air-conditioning systems connected to the same network that leads to databases containing sensitive material like proprietary source code or customer credit cards.

"Your air-conditioning system should never talk to your HR database, but nobody ever talks about that for some reason," Rios said.

The Ponemon survey last year found that in 28 percent of malicious attacks, respondents could not find the source of the breach. Hallawell compared the process of finding the source of a breach to "finding a needle in a haystack."

Ideally, security experts say, corporations should set up their networks so that access to sensitive data is sealed off from third-party systems and remotely monitored with advanced passwords and technology that can identify anomalous traffic - like someone with access to an air-conditioning monitoring system trying to get into an employee database.

But even then, companies require security personnel with experience in detecting such attacks. Even though Target used security technology supplied by FireEye, a company that sounds alerts when it identifies such anomalous activity, its IT personnel ignored the red flags, according to several people who confirmed the findings of a Bloomberg Businessweek investigation last month but could not speak publicly about Target's continuing internal investigation.

Like all else, security experts say, it is simply a matter of priorities. One Arbor Networks study found that unlike banks, which spend up to 12 percent of their information technology budgets on security, retailers spend, on average, less than 5 percent of their budget on security. The bulk of that IT spending goes to customer marketing and data analytics.

"When you know you're the target and you don't know when, where or how an attack will take place, it's wartime all the time," Hallawell said. "And most organizations aren't prepared for wartime."

© 2014, The New York Times News Service

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15 Launch Date Leaked: OxygenOS 16 to Offer Gemini AI Integration
  2. Lava Agni 4 to India Launch Timeline, Design Teased Ahead of Debut
  3. Oppo Find X9 Series Bags Certifications in These Countries, May Launch Soon
  4. Vivo X300 Series Surfaces on Certification Sites; Battery Details Leaked
  5. Flipkart Billion Days: Upgrade Your Home with Premium Soundbars and Smart Locks
  6. Flipkart's Festive Dhamaka Sale Will Start Soon With These Deals
  7. Google Launches New Smart Home Devices Powered by Gemini for Home
  1. Call of Duty: Black Ops 7 Beta Early Access Goes Live as Players Report Cheating
  2. Department of Consumer Affairs to Probe E-Commerce Platforms Over Hidden Cash-on-Delivery Charges
  3. Ubisoft Launches Tencent-Backed Subsidiary, Vantage Studios, to Run Assassin's Creed, Far Cry, and Rainbow Six
  4. OnePlus 15 Global Launch Date Leaked; OxygenOS 16 to Offer Gemini AI Integration With Plus Mind Feature
  5. Vivo X300, Vivo X300 Pro Battery Specifications Leaked; Vivo X300 FE Listed on EEC Certification Site
  6. Oppo Find X9 Series Could Launch in India, Thailand as Handsets Surface on Certification Websites
  7. iPhone 17 Series Reportedly Witnessing Strong Demand, but the iPhone Air Lags Behind
  8. BSNL Finally Launches VoWiFi Service in West, South Zone Circles; 4G Services Rolled Out in Mumbai
  9. Instagram, Facebook Will Soon Start Showing You Ads, Content Based on Your Meta AI Interactions
  10. OpenAI vs Elon Musk: Company Alleges Lawsuit is a 'Harassment Tactic'
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.