By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Web Malware: Out of the Shadows and Hiding in Plain Sight
    12 months ago
    7 Reasons Kaspersky Internet Security 2015 is better than ever
    12 months ago
    Multi-stage phishing that starts with real links
    11 months ago
    Latest News
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
    5 days ago
    Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog
    6 days ago
    Two PHP Object Injection Vulnerabilities Fixed in Essential Blocks
    7 days ago
    Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
    1 week ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Critical vulnerability fixed in popular WordPress plugin Jetpack
    Critical vulnerability fixed in popular WordPress plugin Jetpack
    12 months ago
    Windows 10 22H2 new features and changes
    12 months ago
    Windows 11 build 22000.652 (KB5012643) out as preview
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    7 months ago
    Now you can speed up any video in your browser
    7 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    8 months ago
  • How To
    How ToShow More
    Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
    Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
    17 hours ago
    Cloudflare account permissions, how to use them, and best practices
    Cloudflare account permissions, how to use them, and best practices
    17 hours ago
    Announcing Cloudflare Incident Alerts
    Announcing Cloudflare Incident Alerts
    17 hours ago
    Welcome to Birthday Week 2023
    Welcome to Birthday Week 2023
    2 days ago
    A new wave of innovation with Edge, your AI-powered browser
    3 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    The lawyer held a court session on Zoom with a cat filter
    11 months ago
    How to set a password for a folder in macOS?
    9 months ago
    Editing the text of the site page
    11 months ago
    Latest News
    How to use image layers on Paint for Windows 11
    6 days ago
    How to disable Copilot on Windows 11 (completely)
    2 weeks ago
    How to blur image background in Photos for Windows 11
    2 weeks ago
    How to hide text from screenshots on Snipping Tool for Windows 11
    2 weeks ago
  • Glossary
  • My Bookmarks
Reading: A robot’s ransom
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Threats

A robot’s ransom

Tom Grant
Last updated: 13 October
Tom Grant 12 months ago
Share
4 Min Read

Like most electronic stuff, robots are not immune to cybercriminals. Last year, researchers at IOActive detected as many as 50 vulnerabilities in robots developed by the Japanese firm SoftBank. They informed the manufacturer but never heard back. So this year at the Security Analyst Summit 2018, they decided to demonstrate what can happen if a robot gets hacked.

Contents
Hackable robotsBut why would anyone hack a robot?What can you do?

Hackable robots

Robots are all around us, toiling away in factories and warehouses, busting a gut in landfills, and even working in hospitals. For its part, SoftBank Robotics supplies electronic helpers to work with people. The NAO model introduces school kids and students to programming and robotics, and it also teaches children with autism. Another model, Pepper, was created to work in the service sector — its tasks include attracting potential customers and consulting with buyers.

As the IOActive team discovered, to seize control of NAO you only need to be on the same network as the robot. The experts found vulnerabilities allowing commands to be remotely executed on it, effectively giving over full control of its actions.

To demonstrate how these vulnerabilities can be exploited, the team forced NAO to demand bitcoins from its human interlocutor; but real criminals would be limited only by their imagination and programming skills. What’s more, it’s not just NAO that can be infected with ransomware; the more business-oriented Pepper is just as vulnerable, and other models probably are as well.

Just imagine if one fine day a robot teacher or store clerk, in full view of John Q. Public, started swearing and insulting people before going on strike or picking a fight. You never know!

But why would anyone hack a robot?

What do criminals have to gain here? Won’t it just spoil someone’s day — or their life? That might be enough incentive for some hackers, who often do such things just for fun. But there’s another reason: money.

The profit motive is pretty simple. Buying a robot costs about $10,000; and if it breaks, it has to be repaired or replaced. Both of those require a fair bit of cash to start — but factor in the downtime cost and reputational loss of having a robot threaten customers and the sum rises considerably. And if an industrial robot is hacked, it can pose an immediate threat to employee safety or production quality.

An attacker compromising a robot in one of those ways might offer a quick solution to the problem (which they caused) — pay a ransom and everything will be just fine. But, as you might guess, cybercriminals don’t always keep their word. And, of course, the vulnerable robot might be hacked again, requiring another payout. And then another one.

What can you do?

Robots are here to stay (and multiply), so avoiding contact with them ain’t the way to go. For that, you’d need to invent a time machine and go back a ways. Instead, users — and especially manufacturers — need to be sensitive to robots’ weaknesses.

To ensure that devices don’t go from cutting-edge to catastrophic in the blink of an eye, robot creators need to think through security issues in advance, before production starts. Today. Better still, yesterday. And then, after product release, all ears must be kept firmly to the ground so as to respond promptly to reported vulnerabilities and get them fixed.


Source: kaspersky.com

Translate this article

TAGGED: RC4, Security, Threat, Threats, Vulnerabilities, YouTube
Tom Grant October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Apps 17 hours ago
Cloudflare account permissions, how to use them, and best practices
Cloudflare account permissions, how to use them, and best practices
Apps 17 hours ago
Announcing Cloudflare Incident Alerts
Announcing Cloudflare Incident Alerts
Apps 17 hours ago
Welcome to Birthday Week 2023
Welcome to Birthday Week 2023
Apps 2 days ago
A new wave of innovation with Edge, your AI-powered browser
Windows 3 days ago

You Might Also Like

Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Apps

Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)

17 hours ago
Cloudflare account permissions, how to use them, and best practices
Apps

Cloudflare account permissions, how to use them, and best practices

17 hours ago
Cloudflare Email Security now works with CrowdStrike Falcon LogScale
Apps

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

5 days ago
Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
Wordpress Threats

Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)

5 days ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
Critical Vulnerability in Forminator Plugin
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
PHP Object Injection Vulnerability in Flatsome Theme
How to download Windows 11 22H2 ISO after 23H2 releases
Previous Next

10 New Stories

Curator can help you with PC Game Pass picks
Cloudflare Email Security now works with CrowdStrike Falcon LogScale
Wordfence Intelligence Weekly WordPress Vulnerability Report (September 11, 2023 to September 17, 2023)
Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog
How to use image layers on Paint for Windows 11
New! Rate Limiting analytics and throttling
Previous Next
Hot News
Switching to Cloudflare can cut your network carbon emissions up to 96% (and we’re joining the SBTi)
Cloudflare account permissions, how to use them, and best practices
Announcing Cloudflare Incident Alerts
Welcome to Birthday Week 2023
A new wave of innovation with Edge, your AI-powered browser
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?