From the editor’s desk: Presenting … how you were hacked

May 2019 News & Events

“It’s all fun and games until you hit the wall.” Someone said that to me once (an American, so I don’t know if that’s a common saying in the US). At the time I thought he watched too much reality TV.

These days, however, I think I have a better understanding of what the phrase means. At the time he was working for SCO, a company that made an awesome version of Unix back in the day. After some business dealings, the company decided its business model wouldn’t be based on software that was popular in many small- to medium-sized businesses, and that was loved by almost everyone who came into contact with it (I may be a little biased here, but meeting the CEO and other execs in Santa Cruz was an experience; I have never seen people so passionate about what they did, not even professional marketers who are paid to be excited). But the new bosses decided they would make a fortune by suing people using open source software.

Needless to say the company was under the influence of another company with good reason to badmouth Linux, but that’s another story. Needless to say, their route down was fairly straight with no time for somersaults or any taking in of the scenery.

Not that SCO has anything to do with this editorial. However, I think it may be time to accept that the wall has been hit and to take a step back and re-evaluate. Remember back in 2016 when Mirai became famous? In case not, “In 2016, Mirai showed the massive destructive potential of DDoS attacks as a result of insecure consumer IoT (Internet of Things) devices. Mirai’s attacks exploited only a small number of devices and vulnerabilities and used basic password guessing techniques” (www.securitysa.com/56500n). It’s back and more advanced than ever, see www.securitysa.com/*mirai1 (redirects to https://arstechnica.com/information-technology/2019/03/mirai-botnet-aims-to-wrap-its-tentacles-around-a-new-crop-of-iot-devices/).

While the old version was known for targeting “routers, network storage devices, NVRs, and IP cameras”, the new variant of Mirai adds 11 new exploits, including “WePresent WiPG-1000 Wireless Presentation systems, and in LG Supersign TVs … as well as new credentials to use in brute force against devices.” You can read more at www.securitysa.com/*mirai2 (redirects to https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/).

So now your projector and your TV can be weaponised against you. It really is time we forget about physical and logical security, IoT security and anything else security and focus on security. If it’s electronic, it’s a risk. That should be simple enough.

Remember Stuxnet (https://en.wikipedia.org/wiki/Stuxnet) malware was installed in a highly secure environment that was ‘air-gapped’ – another stupid word that means it had no electronic connection to the outside world. How hard could it be to get into your network, home Wi-Fi or campus?

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...