With Internet of Things penetration set for a trillion devices by 2025, according to recent McKinsey numbers, our thoughts are, or should be, turning to security.
One question that could be posed is: Just how could a future IoT attack play out? What route could it take?
A security company reckons it has an answer.
'Terror in the kitchen'
One World Labs, a security outfit that specializes in penetration testing, forensics, and security code review, presented a session at San Francisco's RSA Conference in April, where it attempted to address the question.
The scenario that One World Labs conjured up was that by hacking a kitchen oven running Android, it would be able to get access to the appliance owner's entire home, including its connected thermostat, Wi-Fi garage door opener, associated automobile, and—perhaps most troubling—his or her place of work, which for the purposes of this scenario is a grid-connected hydro-electric power station.
Theoretically, the hackers would then be able to attack the power grid.
Chris Roberts, the presenter, termed the talk: "From the Oven to the Power Station," or alternatively "The Terror in the Kitchen."
The starting point could be an Android-controlled oven running older software, Roberts thinks.
Older Android software, such as version 4.0.3, is "susceptible to multiple forms of attack," Roberts says in his presentation (PDF). Rooting and then installing apps onto the oven by hacking the user while he's on a public hotspot is the premise of the attack.
Roberts's hopefully imaginary victim is a 15-year power plant veteran. The engineer has a penchant for coffee and likes to frequent a coffee shop near the power plant. That's where he logs on and manages his evening roast via a suitably geeky IoT-connected oven.
Roberts says that the stooge in this case could be marked by scouring social networks, professional discussion forums, and so on; the oven discovered because the individual posts geo-located pictures of it online.
The hacking team knows that the target likes a particular coffee shop in part through social network geo-mapping.
The mark's failure to use disparate online passwords rounds out the perfect storm—stolen passwords can be found on the Internet. IRC channels can be used for this.
Theater of operations
Once the team has profiled their prey, the scenario sets about penetrating the house.
The key to this element is the fact that the oven is on the home's Wi-Fi network. Roberts's team is able to use a widely available network tool that identifies which devices are on a particular network.
Roberts goes into more detail about all of the tools, such as emulators used in the lecture's Power Point.
Sign up for CIO Asia eNewsletters.