Security researchers have developed a capable of sniffing out data from the devices connected to the Internet – better known as the Internet-of-things.
Under its , a team of security researchers at the Texas-based firm Praetorian wanted to create a searchable database that will be the for SCADA devices.
Located More Than 1600+ Devices Using Drone
To make it possible, the researchers devised a drone with their custom built connected-device tracking appliance and flew it over Austin, Texas in real time.
During an 18 minute flight, the drone, of which 453 IoT devices are made by Sony and 110 by Philips.
How did They locate Internet of Things Devices?
The researchers located all and networks and then started expanding their research.
says Paul West Jauregui, from Praetorian.
is a used by the majority of Internet of Things (IoT) devices today.
ZigBee protocol, which lets IoT devices talk to each other, is implemented by major vendors including Toshiba, Philips, Huawei, Sony, Siemens, Samsung, Motorola, and many more.
Exploiting 'ZigBee' to Hack Internet of Things Devices Remotely
Such drone experiments could be even worse if hackers were able to hijack smart-home and Internet-enabled appliances remotely...
…that's Evil! But it has been demonstrated by a Vienna-based team of security researchers at Black Hat security conference.
have some critical security flaws in ZigBee that could allow hackers to compromise ZigBee networks and take over control of all connected devices on a network, including door locks, alarm system and even controlling your light bulbs.
The vulnerability actually relies in the way ZigBee protocol handles the keys it uses to authenticate the IoT devices it adds to its mesh network, allowing hackers to sniff out exchange authenticate keys.
The worse part pointed out by the researcher is that there is nothing users could do to make their smart devices more secure, and since the flaw affects a broad range of devices, it's quite unclear how quickly vendors will come up with a fix.