• About
  • Advertise
  • Careers
  • Contact
Tuesday, March 3, 2026
No Result
View All Result
NEWSLETTER
iotlasvegas
  • Home
  • Internet of Things
  • Security
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise
  • Home
  • Internet of Things
  • Security
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise
No Result
View All Result
iotlasvegas
No Result
View All Result
Home Internet of Things

IoT’s dark side: Hundreds of unsecured devices open to attack

in Internet of Things
0
SHARES
10
VIEWS
Share on FacebookShare on Twitter

ATLANTA — A self-described security “amateur” discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection — meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse.

“You would be amazed [what] you could find,” Espen Sandli, a journalist at the Norwegian newspaper Dagbladet, told the Computer Assisted Reporting conference Thursday. “The project was made from people who had no idea about data security at the start.”

They began by searching for basic security cameras, such as finding and taking control of a surveillance camera inside a nightclub. After that, they graduated to finding compromised control systems at military installations and railroads. In one case, they found a security company’s list of clients and passwords in the clear online. In another, they could have accessed who was allowed to enter or leave a military building. Another device on the open Internet could have allowed them to switch off a railway fire-alarm system.

Sandli and a colleague used the publicly available Shodan search engine, which allows searching by factors such as IP address range, device type, operating system and geography. After getting results, they used investigative reporting skills to track down device owners, including some painstaking tasks such as using Google Earth data to try to match outdoor webcams with their owners.

He said the Dagbladet team didn’t do their own port scanning (instead relying on Shodan’s) and never attempted to enter passwords, even when it was likely that devices were simply using defaults. Those ground rules were part of the project’s ethics baseline, he said. But after just a few hours, it became clear he wouldn’t need to try basic password cracking because there were so many Internet-connected devices where no passwords were needed.

The NullCtrl project team also always contacted owners of affected devices before publishing a story about one, ensuring they had time to secure or remove them.

The Dagbladet journalists consulted with lawyers in Norway to make sure the NullCtrl project wasn’t breaking any laws there. In a discussion after Sandli’s presentation, one American investigative journalist said doing a similar project could be illegal in the U.S. if anyone crosses the threshold from looking at Shodan search results to clicking through and attempting to control a device, even one as harmless as moving a webcam to see a different view.

In Norway, the standard is that there was no malicious action taken. Advice to journalists or would-be white hat security hackers trying to undertake a similar project in the U.S.: Get your own legal advice first.

Sandli said it is his understanding that government security agencies in the U.S. have their own means of searching for unsecured critical infrastructure devices on the Internet and informing their owners of the need to beef up protection. The Norwegian national security agency did not. But after NullCtrl, Dagbladet said, the agency made their own Shodan and started conducting proactive searches too.

The NullCtrl project is online at Dagbladet’s Norwegian website.

This story, ” IoT’s dark side: Hundreds of unsecured devices open to attack” was originally published by

Computerworld.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes Free
Free Download WordPress Themes
Download Best WordPress Themes Free Download
Download WordPress Themes
online free course
download lenevo firmware
Download WordPress Themes
udemy paid course free download
Tags: IoT's dark side: Hundreds of unsecured devices open to attack
Next Post

IBM Internet of Things boss takes new job at Internet2

Recommended

Google wants to bring smart tools to Raspberry Pi-like boards

Google wants to bring smart tools to Raspberry Pi-like boards

Rise of the IoT machines

Rise of the IoT machines

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for our latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Las Vegas USA

© 2024 https://iotlasvegas.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • IoT
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise

© 2024 https://iotlasvegas.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In