The plundering of the Internet of Things has commenced. From a command center in a nondescript high-rise here in the heart of Silicon Valley, security start-up Norse has been gathering shocking evidence of hackers usurping control of Internet-connected appliances, everything from webcams to climate-control systems.
This latest expansion of cybercrime revolves around the IP address assigned to each computing device connected to the Internet. Criminals have begun capitalizing on the fact that many of the mundane digital devices we tie into the Web are easy to find and wide open to hacking.
"There's only one way onto the Internet, and that's through an IP address," Norse CEO Sam Glines says. "The adversary just wants IP space to launch attacks and doesn't really care if it's a baby monitor or a server at a Fortune 1000 company."
The bad guys are using automated programs to scan ranges of IP addresses for signs of vulnerable appliances. It's often a simple matter to take control by installing a few lines of malicious coding.
Norse has devised innovative technology for monitoring such cyberattacks in real time. A tiny sampling of its data , extracted exclusively for CyberTruth, revealed 724 infected appliances actively carrying out fraudulent tasks.
The corrupted appliances included firewalls, routers, modems, printers, DVRs, surveillance cams, webcams, IP cameras, VPN appliances, VOIP phone systems, FM radio transmitters, storage drives, video conferencing systems and climate-control modules. One of the big things these corrupted devices are being used for: payment card fraud.
"We are seeing credit card transactions from baby monitors, DVRs, TVs, printers, medical devices, you name it," says Tommy Stiansen, Norse founder and chief technology officer. "It's coming from all types of industries and from homes."
In a stunning demonstration, Stiansen clicked to the IP address for an activated ABS MegaCam, sold as a $220 baby monitor. The device was activated on the Internet by a resident of Glendale, Calif., who uses Charter Communications as an ISP.
Malicious software embedded on the webcam's Linux operating system causes a live cam view of the homeowner's living room to appear in the browser of anyone who clicks to the webcam's IP address. During Stiansen's demo, a woman and then a man enter the room and sit on a couch. (continued...)
© 2013 USA TODAY under contract with YellowBrix. All rights reserved.