Satoshi Nakamoto Blog
Image default
awareness chromecast Computer network security computer security Computing Cyberwarfare digital media Google Chromecast Hacked Hacker culture Hacking Information and communications technology Interconnectivity IoT isp Mobile content Network Protocols Tech News Technology Threat Modelling Universal Plug and Play Veracode

Hackers hijack 70,000 Google Chromecasts through bug – although Chromecast wasn’t none the wiser – Irish Tech News

It was reported earlier today that Hacker Giraffe has remotely gained access to the TVs and smart devices of tens-of-thousands of Google Chromecast users.

In the hack, a pop-up was displayed that both warns of the exploit and links to a page listing the current number of affected devices. The message also takes a chance to promote controversial YouTube personality, PewDiePie – a move this particular hacker has previously made by hijacking connected printers. While technically this latest hack is made possible via a security flaw in a users’ router, the exploit related to the Chromecast is one that has been known since the year the device launched.

To this end, Paul Farrington – Director of EMEA and APJ Solutions Architecture at Veracode – explains that developers need to test and scan the security of their systems regularly to prevent a UPnP vulnerability being exploited by cyber criminals:

“Universal Plug and Play (UPnP) has been problematic for years. The protocols exist to make interconnectivity of devices simpler for users. The idea behind UPnP is nice, but in the context of a hostile attack landscape, exposes internal networks to risk. Some devices and software applications will rely on UPnP, but the majority won’t. Really the advice for the home user is to turn off UPnP on their Internet router. The problem with the Chromecast device is that Google hasn’t really designed it to anticipate a hostile environment, such as one in which devices can be directly exposed to the Internet.

In general, consumers haven’t been educated on how to make devices secure. Offering advice about disabling features is all well and good, but device manufacturers and probably Internet Service Providers (ISPs) could do more to help the public by providing secure configurations. Before network and software engineers create products, they really need to think about the adversary. Asking the question, ‘how would the attacker benefit from this design feature’ should be a constant question that is asked within development teams.

‘Threat Modelling’ is a term used to describe an approach of identifying ‘secure by design’ architectures that make sensible trade-offs on risk vs. benefit. What’s more, evidence from Veracode’s recent State of Software Security Report (v.9) suggests that DevSecOps teams that embed continuous automated security testing into their routine will eliminate security defects 11.5 times faster than those which test infrequently. As such, upfront thinking about security, coupled with continuous security testing is really the only way to address the modern challenge of keeping consumers safe from hackers.”

If you would like to have your company featured in the Irish Tech News Business Showcase, get in contact with us at [email protected] or on Twitter: @SimonCocking

Source link

Related posts

Airport escalator concept lets you whizz through security in under a MINUTE


Parks rush to clean up toppled trees, trash after shutdown


EE launches the first 5G network trial in Canary Wharf – and it’s capable of AMAZING speeds


Bizarre testicle cooling device helps men with fertility issues – here’s how


YouTube influencers should come with AGE-RATINGS, 38% of parents believe


Hearthstone Rastakhan Rumble UK release time: Card expansion launch news and features revealed